CVE-2010-3495

Summary

CVECVE-2010-3495
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2010-10-19 20:00:00 UTC
Updated2011-01-22 06:43:00 UTC
DescriptionRace condition in ZEO/StorageServer.py in Zope Object Database (ZODB) before 3.10.0 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492.

Risk And Classification

Problem Types: CWE-362

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Zope Zodb 2.10.9 All All All
Application Zope Zodb 2.11.4 All All All
Application Zope Zodb 2.8.11 All All All
Application Zope Zodb 2.9.11 All All All
Application Zope Zodb 3.1 All All All
Application Zope Zodb 3.1.1 All All All
Application Zope Zodb 3.2 All All All
Application Zope Zodb 3.2.4 All All All
Application Zope Zodb 3.3 All All All
Application Zope Zodb 3.3.3 All All All
Application Zope Zodb 3.4 All All All
Application Zope Zodb 3.4.1 All All All
Application Zope Zodb 3.5 All All All
Application Zope Zodb 3.6 All All All
Application Zope Zodb 3.7 All All All
Application Zope Zodb 3.8 All All All
Application Zope Zodb 3.8.0 All All All
Application Zope Zodb 3.8.1 All All All
Application Zope Zodb 3.8.2 All All All
Application Zope Zodb 3.8.6 All All All
Application Zope Zodb 3.9.0 All All All
Application Zope Zodb 3.9.0b1 All All All
Application Zope Zodb 3.9.0b2 All All All
Application Zope Zodb 3.9.0b3 All All All
Application Zope Zodb 3.9.0b4 All All All
Application Zope Zodb 3.9.0b5 All All All
Application Zope Zodb 3.9.0c1 All All All
Application Zope Zodb 2.10.9 All All All
Application Zope Zodb 2.11.4 All All All
Application Zope Zodb 2.8.11 All All All
Application Zope Zodb 2.9.11 All All All
Application Zope Zodb 3.1 All All All
Application Zope Zodb 3.1.1 All All All
Application Zope Zodb 3.2 All All All
Application Zope Zodb 3.2.4 All All All
Application Zope Zodb 3.3 All All All
Application Zope Zodb 3.3.3 All All All
Application Zope Zodb 3.4 All All All
Application Zope Zodb 3.4.1 All All All
Application Zope Zodb 3.5 All All All
Application Zope Zodb 3.6 All All All
Application Zope Zodb 3.7 All All All
Application Zope Zodb 3.8 All All All
Application Zope Zodb 3.8.0 All All All
Application Zope Zodb 3.8.1 All All All
Application Zope Zodb 3.8.2 All All All
Application Zope Zodb 3.8.6 All All All
Application Zope Zodb 3.9.0 All All All
Application Zope Zodb 3.9.0b1 All All All
Application Zope Zodb 3.9.0b2 All All All
Application Zope Zodb 3.9.0b3 All All All
Application Zope Zodb 3.9.0b4 All All All
Application Zope Zodb 3.9.0b5 All All All
Application Zope Zodb 3.9.0c1 All All All
Application Zope Zodb All All All All

References

ReferenceSourceLinkTags
oss-security - Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases MLIST www.openwall.com
oss-security - Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases MLIST www.openwall.com
oss-security - CVE Request -- Python -- accept() implementation in async core is broken => more subcases MLIST www.openwall.com
Python Package Index : ZODB3 3.10.0 CONFIRM pypi.python.org
Issue 6706: asyncore's accept() is broken - Python tracker MISC bugs.python.org Patch
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:024 SUSE lists.opensuse.org
Zope Object Database ZEO Server Denial of Service - Secunia.com SECUNIA secunia.com Vendor Advisory
oss-security - Re: CVE Request -- Python -- accept() implementation in async core is broken => more subcases MLIST www.openwall.com
Bug #135108 “mac osx socket.accept return None instead of """ : Bugs : ZODB CONFIRM bugs.launchpad.net
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report