Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-19274

Опубликовано: 26 нояб. 2019
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:python:typed_ast:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:typed_ast:1.3.1:*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.0136
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

CVSS3: 7.5
debian
около 6 лет назад

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds ...

CVSS3: 7.5
github
около 6 лет назад

typed-ast Out-of-bounds Read

suse-cvrf
почти 6 лет назад

Security update for python-typed-ast

EPSS

Процентиль: 80%
0.0136
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-125