[arch-security] [ASA-201412-15] python2: multiple issues

Levente Polyak anthraxx at archlinux.org
Mon Dec 15 14:43:27 UTC 2014


Arch Linux Security Advisory ASA-201412-15
==========================================

Severity: Medium
Date    : 2014-12-15
CVE-ID  : CVE-2013-1752 CVE-2013-1753 CVE-2014-9365
Package : python2
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/index.php/CVE-2014

Summary
=======

The package python2 before version 2.7.9-1 is vulnerable to denial of
service and man-in-the-middle attacks.

Resolution
==========

Upgrade to 2.7.9-1.

# pacman -Syu "python2>=2.7.9-1"

The problems have been fixed upstream in version 2.7.9.

Workaround
==========

None.

Description
===========

- CVE-2013-1752 (denial of service)
Multiple unbound readline() flaws in python stdlib were found, which can
lead to excessive memory usage if a malicious or broken server sends
excessively long lines without any line breaks.

- CVE-2013-1753 (denial of service)
The XMLRPC library is vulnerable to unrestricted decompression of HTTP
responses using gzip enconding. A malicious server can send a specially
prepared HTTP request that can result in memory exhaustion.

- CVE-2014-9365 (man-in-the-middle)
When Python's standard library HTTP clients (httplib, urllib, urllib2,
xmlrpclib) are used to access resources with HTTPS, by default the
certificate is not checked against any trust store, nor is the hostname
in the certificate checked against the requested host. It was possible
to configure a trust root to be checked against, however there were no
faculties for hostname checking. This made MITM attacks against the HTTP
clients trivial, and violated RFC 2818.

Impact
======

An remote attacker is able to perform a man-in-the-middle attack or
cause a denial of service.

References
==========

https://hg.python.org/cpython/raw-file/v2.7.9/Misc/NEWS
https://access.redhat.com/security/cve/CVE-2013-1752
https://access.redhat.com/security/cve/CVE-2013-1753
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9365
https://bugs.python.org/issue16041
https://bugs.python.org/issue16042
https://bugs.python.org/issue16043
https://bugs.python.org/issue22417

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20141215/969d4100/attachment.bin>


More information about the arch-security mailing list