Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3177

Опубликовано: 19 янв. 2021
Источник: debian
EPSS Низкий

Описание

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python3.9fixed3.9.1-3package
python3.8removedpackage
python3.7removedpackage
python3.7fixed3.7.3-2+deb10u3busterpackage
python3.7no-dsastretchpackage
python3.5removedpackage
python2.7fixed2.7.18-2package

Примечания

  • https://bugs.python.org/issue42938

  • https://github.com/python/cpython/pull/24239

  • https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html

  • https://github.com/python/cpython/commit/916610ef90a0d0761f08747f7b0905541f0977c7 (master)

  • https://github.com/python/cpython/commit/c347cbe694743cee120457aa6626712f7799a932 (3.9)

  • https://github.com/python/cpython/commit/ece5dfd403dac211f8d3c72701fe7ba7b7aa5b5f (3.8)

  • https://github.com/python/cpython/commit/d9b8f138b7df3b455b54653ca59f491b4840d6fa (3.7)

  • https://github.com/python/cpython/commit/34df10a9a16b38d54421eeeaf73ec89828563be7 (3.6)

EPSS

Процентиль: 8%
0.00032
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 5.9
redhat
больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
nvd
больше 4 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

CVSS3: 9.8
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 9.8
github
около 3 лет назад

Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

EPSS

Процентиль: 8%
0.00032
Низкий