Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-7040
HistoryMay 19, 2014 - 12:00 a.m.

CVE-2013-7040

2014-05-1900:00:00
ubuntu.com
ubuntu.com
11

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.6%

Python 2.7 before 3.4 only uses the last eight bits of the prefix to
randomize hash values, which causes it to compute hash values without
restricting the ability to trigger hash collisions predictably and makes it
easier for context-dependent attackers to cause a denial of service (CPU
consumption) via crafted input to an application that maintains a hash
table. NOTE: this vulnerability exists because of an incomplete fix for
CVE-2012-1150.

Bugs

Notes

Author Note
mdeslaur This is being fixed upstream by changing the hashing algorithm to SipHash in python 3.4. See http://www.python.org/dev/peps/pep-0456/ Upstream has no intention of backporting this change to stable releases. We will not be fixing this in older releases.

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.007 Low

EPSS

Percentile

80.6%