Lucene search

K
f5F5F5:K000134706
HistoryMay 20, 2023 - 12:00 a.m.

K000134706 : Python IDNA vulnerability CVE-2022-45061

2023-05-2000:00:00
my.f5.com
17
python
idna
vulnerability
cve-2022-45061
cpu denial
hostnames
remote servers
malicious actor
http
fix
performance
degradation
denial-of-service
f5os
big-ip next spk
big-ip next cnf

AI Score

6.8

Confidence

High

EPSS

0.008

Percentile

81.5%

Security Advisory Description

An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16. (CVE-2022-45061)

Impact

System performance degradation can occur until the process is forced to restart. This vulnerability allows a local authenticated attacker to cause a degradation of service that can lead to a denial-of-service (DoS) on the F5OS, BIG-IP Next SPK, or BIG-IP Next CNF system.