[arch-security] [ASA-201412-15] python2: multiple issues
Arch Linux Security Advisory ASA-201412-15 ========================================== Severity: Medium Date : 2014-12-15 CVE-ID : CVE-2013-1752 CVE-2013-1753 CVE-2014-9365 Package : python2 Type : multiple issues Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE-2014 Summary ======= The package python2 before version 2.7.9-1 is vulnerable to denial of service and man-in-the-middle attacks. Resolution ========== Upgrade to 2.7.9-1. # pacman -Syu "python2>=2.7.9-1" The problems have been fixed upstream in version 2.7.9. Workaround ========== None. Description =========== - CVE-2013-1752 (denial of service) Multiple unbound readline() flaws in python stdlib were found, which can lead to excessive memory usage if a malicious or broken server sends excessively long lines without any line breaks. - CVE-2013-1753 (denial of service) The XMLRPC library is vulnerable to unrestricted decompression of HTTP responses using gzip enconding. A malicious server can send a specially prepared HTTP request that can result in memory exhaustion. - CVE-2014-9365 (man-in-the-middle) When Python's standard library HTTP clients (httplib, urllib, urllib2, xmlrpclib) are used to access resources with HTTPS, by default the certificate is not checked against any trust store, nor is the hostname in the certificate checked against the requested host. It was possible to configure a trust root to be checked against, however there were no faculties for hostname checking. This made MITM attacks against the HTTP clients trivial, and violated RFC 2818. Impact ====== An remote attacker is able to perform a man-in-the-middle attack or cause a denial of service. References ========== https://hg.python.org/cpython/raw-file/v2.7.9/Misc/NEWS https://access.redhat.com/security/cve/CVE-2013-1752 https://access.redhat.com/security/cve/CVE-2013-1753 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9365 https://bugs.python.org/issue16041 https://bugs.python.org/issue16042 https://bugs.python.org/issue16043 https://bugs.python.org/issue22417
participants (1)
-
Levente Polyak