CVE-2006-1542

N/A Unknown
Published: March 30, 2006 Modified: April 16, 2026
View on NVD

Description

Stack-based buffer overflow in Python 2.4.2 and earlier, running on Linux 2.6.12.5 under gcc 4.0.3 with libc 2.3.5, allows local users to cause a "stack overflow," and possibly gain privileges, by running a script from a current working directory that has a long name, related to the realpath function. NOTE: this might not be a vulnerability. However, the fact that it appears in a programming language interpreter could mean that some applications are affected, although attack scenarios might be limited because the attacker might already need to cross privilege boundaries to cause an exploitable program to be placed in a directory with a long name; or, depending on the method that Python uses to determine the current working directory, setuid applications might be affected.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/31492
Source: cve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: cve@mitre.org
Third Party Advisory
https://www.exploit-db.com/exploits/1591
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://secunia.com/advisories/31492
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.gotfault.net/research/exploit/gexp-python.py
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.redhat.com/support/errata/RHSA-2008-0629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/1591
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.2%
43th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

python