[arch-security] [ASA-201412-15] python2: multiple issues
anthraxx at archlinux.org
Mon Dec 15 14:43:27 UTC 2014
Arch Linux Security Advisory ASA-201412-15
Date : 2014-12-15
CVE-ID : CVE-2013-1752 CVE-2013-1753 CVE-2014-9365
Package : python2
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE-2014
The package python2 before version 2.7.9-1 is vulnerable to denial of
service and man-in-the-middle attacks.
Upgrade to 2.7.9-1.
# pacman -Syu "python2>=2.7.9-1"
The problems have been fixed upstream in version 2.7.9.
- CVE-2013-1752 (denial of service)
Multiple unbound readline() flaws in python stdlib were found, which can
lead to excessive memory usage if a malicious or broken server sends
excessively long lines without any line breaks.
- CVE-2013-1753 (denial of service)
The XMLRPC library is vulnerable to unrestricted decompression of HTTP
responses using gzip enconding. A malicious server can send a specially
prepared HTTP request that can result in memory exhaustion.
- CVE-2014-9365 (man-in-the-middle)
When Python's standard library HTTP clients (httplib, urllib, urllib2,
xmlrpclib) are used to access resources with HTTPS, by default the
certificate is not checked against any trust store, nor is the hostname
in the certificate checked against the requested host. It was possible
to configure a trust root to be checked against, however there were no
faculties for hostname checking. This made MITM attacks against the HTTP
clients trivial, and violated RFC 2818.
An remote attacker is able to perform a man-in-the-middle attack or
cause a denial of service.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 819 bytes
Desc: OpenPGP digital signature
More information about the arch-security