CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.3%
A vulnerability was identified in the kjd/idna library, specifically within the idna.encode()
function, affecting version 3.6. The issue arises from the function’s handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the idna.encode()
function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | python-idna | <Â 3.3-1+deb12u1 | python-idna_3.3-1+deb12u1_all.deb |
Debian | 11 | all | python-idna | <Â 2.10-1+deb11u1 | python-idna_2.10-1+deb11u1_all.deb |
Debian | 999 | all | python-idna | <Â 3.6-2.1 | python-idna_3.6-2.1_all.deb |
Debian | 13 | all | python-idna | <Â 3.6-2.1 | python-idna_3.6-2.1_all.deb |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
17.3%