Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6m9g-jr8c-cqw3

Опубликовано: 29 апр. 2020
Источник: github
Github: Прошло ревью
CVSS4: 8.3
CVSS3: 7.4

Описание

Depth counting error in guard() leading to multiple potential security issues in aioxmpp

Impact

Possible remote Denial of Service or Data Injection.

Patches

Patches are available in https://github.com/horazont/aioxmpp/pull/268. They have been backported to the 0.10 release series and 0.10.3 is the first release to contain the fix.

Workarounds

To make the bug exploitable, an error suppressing xso_error_handler is required. By not using xso_error_handlers or not using the suppression function, the vulnerability can be mitigated completely (to our knowledge).

References

The pull request contains a detailed description: https://github.com/horazont/aioxmpp/pull/268

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

aioxmpp

pip
Затронутые версииВерсия исправления

< 0.10.3

0.10.3

EPSS

Процентиль: 58%
0.00362
Низкий

8.3 High

CVSS4

7.4 High

CVSS3

Дефекты

CWE-237

Связанные уязвимости

CVSS3: 7.4
ubuntu
около 7 лет назад

aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3.

CVSS3: 7.4
nvd
около 7 лет назад

aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vulnerability in Stanza Parser, rollback during error processing, aioxmpp.xso.model.guard function that can result in Denial of Service, Other. This attack appears to be exploitable via Remote. A crafted stanza can be sent to an application which uses the vulnerable components to either inject data in a different context or cause the application to reconnect (potentially losing data). This vulnerability appears to have been fixed in 0.10.3.

CVSS3: 7.4
debian
около 7 лет назад

aioxmpp version 0.10.2 and earlier contains a Improper Handling of Str ...

EPSS

Процентиль: 58%
0.00362
Низкий

8.3 High

CVSS4

7.4 High

CVSS3

Дефекты

CWE-237