Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2004-2680

Опубликовано: 16 апр. 2004
Источник: redhat
EPSS Средний

Описание

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.

Отчет

The Red Hat Security Response Team has rated this issue as having low security impact. We no longer plan to fix this flaw in Red Hat Enterprise Linux 4.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4mod_pythonWill not fix
Red Hat Enterprise Linux 5mod_pythonNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=231065mod_python arbitrary data disclosure flaw

EPSS

Процентиль: 93%
0.11617
Средний

Связанные уязвимости

ubuntu
больше 20 лет назад

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.

nvd
больше 20 лет назад

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.

debian
больше 20 лет назад

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly ...

github
больше 3 лет назад

mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.

EPSS

Процентиль: 93%
0.11617
Средний