Vulnerabilities > CVE-2014-1604 - Unspecified vulnerability in Python Rply 0.7.0
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7.1 allows local users to spoof cache data by pre-creating a temporary rply-*.json file with a predictable name.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735263
- http://secunia.com/advisories/56429
- http://www.openwall.com/lists/oss-security/2014/01/17/8
- http://www.openwall.com/lists/oss-security/2014/01/18/4
- http://www.osvdb.org/102202
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90593
- https://github.com/alex/rply/commit/fc9bbcd25b0b4f09bbd6339f710ad24c129d5d7c