CVE-2006-4980

Summary

CVECVE-2006-4980
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2006-10-10 04:06:00 UTC
Updated2023-08-02 18:04:00 UTC
DescriptionBuffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Python Python All All All All
Application Python Software Foundation Python 2.3 All All All
Application Python Software Foundation Python 2.3.1 All All All
Application Python Software Foundation Python 2.3.2 All All All
Application Python Software Foundation Python 2.3.3 All All All
Application Python Software Foundation Python 2.3.4 All All All
Application Python Software Foundation Python 2.3.5 All All All
Application Python Software Foundation Python 2.4 All All All
Application Python Software Foundation Python 2.4.2 All All All
Application Python Software Foundation Python 2.4.3 All All All
Application Python Software Foundation Python 2.5_alpha_1 All All All
Application Python Software Foundation Python 2.5_alpha_2 All All All
Application Python Software Foundation Python 2.5_beta_1 All All All
Application Python Software Foundation Python 2.5_beta_2 All All All
Application Python Software Foundation Python 2.5_beta_3 All All All
Application Python Software Foundation Python 2.5_final All All All
Application Python Software Foundation Python 2.5_release_candidate_1 All All All
Application Python Software Foundation Python 2.5_release_candidate_2 All All All
Application Python Software Foundation Python 2.3 All All All
Application Python Software Foundation Python 2.3.1 All All All
Application Python Software Foundation Python 2.3.2 All All All
Application Python Software Foundation Python 2.3.3 All All All
Application Python Software Foundation Python 2.3.4 All All All
Application Python Software Foundation Python 2.3.5 All All All
Application Python Software Foundation Python 2.4 All All All
Application Python Software Foundation Python 2.4.2 All All All
Application Python Software Foundation Python 2.4.3 All All All
Application Python Software Foundation Python 2.5_alpha_1 All All All
Application Python Software Foundation Python 2.5_alpha_2 All All All
Application Python Software Foundation Python 2.5_beta_1 All All All
Application Python Software Foundation Python 2.5_beta_2 All All All
Application Python Software Foundation Python 2.5_beta_3 All All All
Application Python Software Foundation Python 2.5_final All All All
Application Python Software Foundation Python 2.5_release_candidate_1 All All All
Application Python Software Foundation Python 2.5_release_candidate_2 All All All

References

ReferenceSourceLinkTags
Red Hat update for python - Advisories - Secunia SECUNIA secunia.com
Repository / Oval Repository OVAL oval.cisecurity.org
Ubuntu update for python - Advisories - Secunia SECUNIA secunia.com Patch, Vendor Advisory
Gentoo Linux Documentation -- Python: Buffer Overflow GENTOO security.gentoo.org
208162 – CVE-2006-4980 repr unicode buffer overflow CONFIRM bugzilla.redhat.com
SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia SECUNIA secunia.com
Support REDHAT www.redhat.com
usn/usn-359-1 - Ubuntu: Linux for human beings UBUNTU www.ubuntu.com
Bug #56633 in python2.4 (Ubuntu): “buffer overrun in repr() for unicode strings” CONFIRM launchpad.net
Download Patch ESX-9986131 for VMware ESX Server 3.0.1 CONFIRM www.vmware.com
VMWare ESX Server Multiple Vulnerabilities - Advisories - Secunia SECUNIA secunia.com
Python Repr() Function Remote Code Execution Vulnerability BID www.securityfocus.com
Support REDHAT www.redhat.com
Mandriva update for python - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
SecurityTracker.com Archives - Python repr() Processing of UTF-32/UCS-4 Strings May Let Remote Users Deny Service or Execute Arbitrary Code SECTRACK securitytracker.com
Debian update for python2.4 - Secunia Advisories - Vulnerability Intelligence - Secunia.com SECUNIA secunia.com
#391589 - [CVE-2006-4980] buffer overrun in repr() for unicode strings - Debian Bug report logs CONFIRM bugs.debian.org
[#RPL-702] Buffer overflow in Python's repr function creates vulnerabilities in some python applications CVE-2006-4980 - rPath JIRA CONFIRM issues.rpath.com
SourceForge.net: ERROR CONFIRM sourceforge.net
Security Announcement SUSE www.novell.com
rPath update for idle and python - Advisories - Secunia SECUNIA secunia.com
Avaya Python "repr()" Unicode String Buffer Overflow Vulnerability - Advisories - Secunia SECUNIA secunia.com
20061001-01-P SGI patches.sgi.com
SUSE Update for Multiple Packages - Advisories - Secunia SECUNIA secunia.com
Advisories - Mandriva Linux MANDRIVA www.mandriva.com
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
zoehep.xent.com/~bsittler/python2.4-2.4.3_unicodeobject.c.diff CONFIRM zoehep.xent.com
Debian update for python2.3 - Advisories - Secunia SECUNIA secunia.com
Debian -- Security Information -- DSA-1197-1 python2.4 DEBIAN www.debian.org
VMware Knowledge Base CONFIRM kb.vmware.com
ASA-2006-229 (RHSA-2006-0713) CONFIRM support.avaya.com
Gentoo update for python - Advisories - Secunia SECUNIA secunia.com
Webmail - OVH VUPEN www.vupen.com
Webmail - OVH VUPEN www.vupen.com
SecurityFocus BUGTRAQ www.securityfocus.com
Debian -- Security Information -- DSA-1198-1 python2.3 DEBIAN www.debian.org
Download Patch ESX-3069097 for VMware ESX Server 3.0.1 CONFIRM www.vmware.com
Red Hat Network Satellite Server Update for Solaris Client - Advisories - Community SECUNIA secunia.com
SecurityFocus BUGTRAQ www.securityfocus.com
Python "repr()" Unicode String Buffer Overflow Vulnerability - Advisories - Secunia SECUNIA secunia.com Patch, Vendor Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

OrganizationPublishedContributorStatement
Red Hat2007-03-14Mark J CoxRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report