5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.1%
Issue Overview:
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. (CVE-2019-20907)
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.) A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the “host” part of the URL. (CVE-2019-18348)
Affected Packages:
python34, python35
Issue Correction:
Run yum update python34 to update your system.
Run yum update python35 to update your system.
New Packages:
i686:
python34-debuginfo-3.4.10-1.51.amzn1.i686
python34-devel-3.4.10-1.51.amzn1.i686
python34-libs-3.4.10-1.51.amzn1.i686
python34-tools-3.4.10-1.51.amzn1.i686
python34-test-3.4.10-1.51.amzn1.i686
python34-3.4.10-1.51.amzn1.i686
python35-test-3.5.9-1.27.amzn1.i686
python35-debuginfo-3.5.9-1.27.amzn1.i686
python35-libs-3.5.9-1.27.amzn1.i686
python35-devel-3.5.9-1.27.amzn1.i686
python35-tools-3.5.9-1.27.amzn1.i686
python35-3.5.9-1.27.amzn1.i686
src:
python34-3.4.10-1.51.amzn1.src
python35-3.5.9-1.27.amzn1.src
x86_64:
python34-test-3.4.10-1.51.amzn1.x86_64
python34-3.4.10-1.51.amzn1.x86_64
python34-devel-3.4.10-1.51.amzn1.x86_64
python34-libs-3.4.10-1.51.amzn1.x86_64
python34-tools-3.4.10-1.51.amzn1.x86_64
python34-debuginfo-3.4.10-1.51.amzn1.x86_64
python35-devel-3.5.9-1.27.amzn1.x86_64
python35-debuginfo-3.5.9-1.27.amzn1.x86_64
python35-test-3.5.9-1.27.amzn1.x86_64
python35-libs-3.5.9-1.27.amzn1.x86_64
python35-3.5.9-1.27.amzn1.x86_64
python35-tools-3.5.9-1.27.amzn1.x86_64
Red Hat: CVE-2019-18348, CVE-2019-20907
Mitre: CVE-2019-18348, CVE-2019-20907
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | python34-debuginfo | < 3.4.10-1.51.amzn1 | python34-debuginfo-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-devel | < 3.4.10-1.51.amzn1 | python34-devel-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-libs | < 3.4.10-1.51.amzn1 | python34-libs-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-tools | < 3.4.10-1.51.amzn1 | python34-tools-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-test | < 3.4.10-1.51.amzn1 | python34-test-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34 | < 3.4.10-1.51.amzn1 | python34-3.4.10-1.51.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python35-test | < 3.5.9-1.27.amzn1 | python35-test-3.5.9-1.27.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python35-debuginfo | < 3.5.9-1.27.amzn1 | python35-debuginfo-3.5.9-1.27.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python35-libs | < 3.5.9-1.27.amzn1 | python35-libs-3.5.9-1.27.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python35-devel | < 3.5.9-1.27.amzn1 | python35-devel-3.5.9-1.27.amzn1.i686.rpm |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.012 Low
EPSS
Percentile
85.1%