5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.1%
Issue Overview:
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. (CVE-2019-20907)
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.) A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the “host” part of the URL. (CVE-2019-18348)
Affected Packages:
python36
Issue Correction:
Run yum update python36 to update your system.
New Packages:
i686:
python36-devel-3.6.11-1.18.amzn1.i686
python36-libs-3.6.11-1.18.amzn1.i686
python36-test-3.6.11-1.18.amzn1.i686
python36-tools-3.6.11-1.18.amzn1.i686
python36-debug-3.6.11-1.18.amzn1.i686
python36-3.6.11-1.18.amzn1.i686
python36-debuginfo-3.6.11-1.18.amzn1.i686
src:
python36-3.6.11-1.18.amzn1.src
x86_64:
python36-devel-3.6.11-1.18.amzn1.x86_64
python36-debuginfo-3.6.11-1.18.amzn1.x86_64
python36-libs-3.6.11-1.18.amzn1.x86_64
python36-debug-3.6.11-1.18.amzn1.x86_64
python36-3.6.11-1.18.amzn1.x86_64
python36-tools-3.6.11-1.18.amzn1.x86_64
python36-test-3.6.11-1.18.amzn1.x86_64
Red Hat: CVE-2019-18348, CVE-2019-20907
Mitre: CVE-2019-18348, CVE-2019-20907
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | python36-devel | < 3.6.11-1.18.amzn1 | python36-devel-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36-libs | < 3.6.11-1.18.amzn1 | python36-libs-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36-test | < 3.6.11-1.18.amzn1 | python36-test-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36-tools | < 3.6.11-1.18.amzn1 | python36-tools-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36-debug | < 3.6.11-1.18.amzn1 | python36-debug-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36 | < 3.6.11-1.18.amzn1 | python36-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python36-debuginfo | < 3.6.11-1.18.amzn1 | python36-debuginfo-3.6.11-1.18.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | python36-devel | < 3.6.11-1.18.amzn1 | python36-devel-3.6.11-1.18.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | python36-debuginfo | < 3.6.11-1.18.amzn1 | python36-debuginfo-3.6.11-1.18.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | python36-libs | < 3.6.11-1.18.amzn1 | python36-libs-3.6.11-1.18.amzn1.x86_64.rpm |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.1%