Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-1150

Опубликовано: 05 окт. 2012
Источник: nvd
CVSS2: 5
EPSS Низкий

Описание

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Версия до 2.6.7 (включая)
cpe:2.3:a:python:python:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.5.150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*

EPSS

Процентиль: 81%
0.01575
Низкий

5 Medium

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
около 13 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

redhat
почти 14 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

debian
около 13 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x b ...

github
больше 3 лет назад

Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

oracle-oval
больше 13 лет назад

ELSA-2012-0745: python security update (MODERATE)

EPSS

Процентиль: 81%
0.01575
Низкий

5 Medium

CVSS2

Дефекты

CWE-310