Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1000117

Опубликовано: 07 мар. 2018
Источник: debian
EPSS Низкий

Описание

Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python3.7not-affectedpackage
python3.6not-affectedpackage
python3.5not-affectedpackage
python3.4not-affectedpackage
python2.7not-affectedpackage

Примечания

  • http://hg.python.org/lookup/6921e73e33edc3c61bc2d78ed558eaa22a89a564

  • https://bugs.python.org/issue33001

EPSS

Процентиль: 19%
0.00059
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
больше 7 лет назад

Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.

CVSS3: 6.7
nvd
больше 7 лет назад

Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.

CVSS3: 6.7
github
около 3 лет назад

Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.

EPSS

Процентиль: 19%
0.00059
Низкий