Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-1150

Опубликовано: 05 окт. 2012
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия до 2.6.7 (включая)
cpe:2.3:a:python:python:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01489
Низкий

5 Medium

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
больше 12 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

redhat
больше 13 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

debian
больше 12 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x b ...

github
около 3 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

oracle-oval
около 13 лет назад

ELSA-2012-0745: python security update (MODERATE)

EPSS

Процентиль: 80%
0.01489
Низкий

5 Medium

CVSS2

Дефекты

CWE-310