|Related CVE||CVE-2013-4238 CVE-2014-1912 CVE-2014-7185 CVE-2019-16056|
Vulnerabilities have been discovered in Python, an interactive high-level object-oriented language.
The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied.
A man-in-the-middle attack is possible by spoof of arbitrary SSL servers via a crafted certificate resulting from improper handling of '\0' characters in a domain name in the Subject Alternative Name field of an X.509 certificate.
Arbitrary remote code execution is possible via a crafted string resulting from a buffer overflow in the socket.recvfrom_into function.
A context-dependent attacker can take advantage of an integer overflow to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
For Debian 7 Wheezy, these problems have been fixed in version 2.6.8-1.1+deb7u4.
We recommend that you upgrade your python2.6 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/