Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
{ "cwe_ids": [] }
{ "vanir_signatures": [ { "source": "https://github.com/python/cpython/commit/550b945fd66f1c6837a53fbf29dc8e524297b8c3", "digest": { "function_hash": "309977180046877818326265354308150323506", "length": 1576.0 }, "deprecated": false, "signature_type": "Function", "id": "PSF-2014-6-49d160cc", "target": { "function": "get_buf", "file": "Objects/bufferobject.c" }, "signature_version": "v1" }, { "source": "https://github.com/python/cpython/commit/550b945fd66f1c6837a53fbf29dc8e524297b8c3", "digest": { "line_hashes": [ "150755083869012394236169596343615360559", "333759549387786561734708116223330721126", "245122130842657787089162520002778066703", "223354793685248631443489536811747358716", "216301770560921474631172421429308174413" ], "threshold": 0.9 }, "deprecated": false, "signature_type": "Line", "id": "PSF-2014-6-89cf1351", "target": { "file": "Objects/bufferobject.c" }, "signature_version": "v1" } ] }