Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10735

Опубликовано: 02 сент. 2022
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

Отчет

This flaw was found in the Python interpreter's algorithms for converting strings to integers in non-binary bases (such as base-10). This algorithmic complexity vulnerability is triggered when an application attempts to parse a string containing an excessive number of digits. This flaw is rated as moderate because the near-quadratic processing time can be exploited to cause a Denial of Service (DoS) by exhausting CPU resources, which impacts the availability of the application process rather than the entire system. Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as 'Not affected' as they just provide "symlinks" to the main python3 component, which provides the actual interpreter of the Python programming language. Python 2 has been declared end of life and no patches will be made available for it.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pythonOut of support scope
Red Hat Enterprise Linux 6pythonOut of support scope
Red Hat Enterprise Linux 7pythonOut of support scope
Red Hat Enterprise Linux 7python3Out of support scope
Red Hat Enterprise Linux 8python27:2.7/python2Will not fix
Red Hat Enterprise Linux 8python36:3.6/python36Not affected
Red Hat Enterprise Linux 8python39Not affected
Red Hat Quay 3quayAffected
Red Hat Software Collectionspython27-pythonWill not fix
Red Hat Enterprise Linux 8python3FixedRHSA-2023:083321.02.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-704->CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1834423python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS

EPSS

Процентиль: 53%
0.00294
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
nvd
больше 3 лет назад

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 3 лет назад

A flaw was found in python. In algorithms with quadratic time complexi ...

rocky
больше 3 лет назад

Moderate: python3.9 security update

EPSS

Процентиль: 53%
0.00294
Низкий

7.5 High

CVSS3