5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4 High
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.1%
Python is prone to a denial of service (DoS) vulnerability.
# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:python:python";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.118243");
script_version("2023-07-05T05:06:18+0000");
script_tag(name:"last_modification", value:"2023-07-05 05:06:18 +0000 (Wed, 05 Jul 2023)");
script_tag(name:"creation_date", value:"2021-10-04 12:04:36 +0200 (Mon, 04 Oct 2021)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-07-29 12:15:00 +0000 (Wed, 29 Jul 2020)");
script_cve_id("CVE-2018-14647");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Python 2.7.x < 2.7.16, 3.4.x < 3.4.10, 3.5.x < 3.5.7, 3.6.x < 3.6.7, 3.7.0 Python Issue (bpo-34623) - Linux");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_python_consolidation.nasl", "os_detection.nasl");
script_mandatory_keys("python/detected", "Host/runs_unixoide");
script_tag(name:"summary", value:"Python is prone to a denial of service (DoS) vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The flaw exists because Python's elementtree C accelerator
fails to initialise Expat's hash salt during initialization");
script_tag(name:"impact", value:"Successful exploitation allows denial of service attacks
against Expat by constructing an XML document that would cause pathological hash collisions
in Expat's internal data structures, consuming large amounts CPU and RAM.");
script_tag(name:"affected", value:"Python versions 2.7.0 through 2.7.15, 3.4.0 through 3.4.9,
3.5.0 through 3.5.6, 3.6.0 through 3.6.6 and 3.7.0.");
script_tag(name:"solution", value:"Update to version 2.7.16, 3.4.10, 3.5.7, 3.6.7, 3.7.1 or later.");
script_xref(name:"URL", value:"https://python-security.readthedocs.io/vuln/elementree_salt.html");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/105396");
script_xref(name:"URL", value:"https://bugs.python.org/issue34623");
script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647");
script_xref(name:"Advisory-ID", value:"bpo-34623");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (isnull(port = get_app_port(cpe: CPE)))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE, version_regex:"^[0-9]+\.[0-9]+\.[0-9]+"))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_is_less(version: version, test_version: "2.7.16")) {
report = report_fixed_ver(installed_version: version, fixed_version: "2.7.16", install_path: location);
security_message(port: port, data: report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.4", test_version2: "3.4.9")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.4.10", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.5", test_version2: "3.5.6")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.5.7", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.6", test_version2: "3.6.6")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.6.7", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_is_equal(version: version, test_version: "3.7.0")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.7.1", install_path: location);
security_message(port: port, data:report);
exit(0);
}
exit(99);
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4 High
AI Score
Confidence
High
0.006 Low
EPSS
Percentile
79.1%