|A former member||
Secunia Advisory: SA16855 Print Advisory
Release Date: 2005-09-19
Impact: System access
Where: From local network
Solution Status: Vendor Patch
Software: Py2Play 0.x
Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.
CVE reference: CAN-2005-2875
Arc Riley has reported a vulnerability in Py2Play, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused to a design error in the handling of serialized Python objects (pickles) sent from other clients. This can be exploited to execute arbitrary Python code in a network game that uses Py2Play, via specially crafted classes.
The vulnerability has been reported in version 0.1.7. Other versions may also be affected.
The vulnerability has been fixed in the CVS repositories by disabling network support.
Play network games only when connected to trusted networks.
Provided and/or discovered by:
Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
Edited by User 2,314,771 on Sep 19, 2005 9:51 AM