Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7xxv-wpxj-mx5v

Опубликовано: 02 дек. 2019
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

typed-ast Out-of-bounds Read

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

Пакеты

Наименование

typed-ast

pip
Затронутые версииВерсия исправления

>= 1.3.0, <= 1.3.1

1.3.2

EPSS

Процентиль: 80%
0.0136
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

CVSS3: 7.5
nvd
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

CVSS3: 7.5
debian
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. ...

suse-cvrf
почти 6 лет назад

Security update for python-typed-ast

EPSS

Процентиль: 80%
0.0136
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-125