Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-42343

Опубликовано: 26 окт. 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dask.distributedfixed2021.09.1+ds.1-2package
dask.distributedfixed2021.01.0+ds.1-2.1+deb11u1bullseyepackage
dask.distributedignoredbusterpackage

Примечания

  • https://github.com/dask/distributed/pull/5427

  • https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr

  • Likely introduced in https://github.com/quasiben/distributed/commit/fd31ecca8017bae845a73d468de0376c02363fab (2.0.0)

EPSS

Процентиль: 88%
0.03703
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 4 лет назад

An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.

CVSS3: 9.8
nvd
больше 4 лет назад

An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

Workers for local Dask clusters mistakenly listened on public interfaces

EPSS

Процентиль: 88%
0.03703
Низкий