Executive Summary
Summary | |
---|---|
Title | Python vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-4127-2 | First vendor Publication | 2019-09-10 |
Vendor | Ubuntu | Last vendor Modification | 2019-09-10 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM - Ubuntu 12.04 ESM Summary: Several security issues were fixed in Python. Software Description: - python2.7: An interactive high-level object-oriented language - python3.4: An interactive high-level object-oriented language Details: USN-4127-1 fixed several vulnerabilities in Python. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. Original advisory details: It was discovered that Python incorrectly handled certain pickle files. An It was discovered that Python incorrectly validated the domain when Jonathan Birch and Panayiotis Panayiotou discovered that Python incorrectly Colin Read and Nicolas Edet discovered that Python incorrectly handled It was discovered that Python incorrectly handled certain urls. A remote Sihoon Lee discovered that Python incorrectly handled the local_file: Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: Ubuntu 12.04 ESM: In general, a standard system update will make all the necessary changes. References: |
Original Source
Url : http://www.ubuntu.com/usn/USN-4127-2 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-93 | Failure to Sanitize CRLF Sequences ('CRLF Injection') |
17 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
17 % | CWE-172 | Encoding Error |
17 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
17 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2019-09-10 17:18:54 |
|