Lucene search

K
amazonAmazonALAS-2014-425
HistoryOct 14, 2014 - 10:04 a.m.

Medium: python-oauth2

2014-10-1410:04:00
alas.aws.amazon.com
13

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

66.0%

Issue Overview:

The Server.verify_request function in SimpleGeo python-oauth2 does not check the nonce, which allows remote attackers to perform replay attacks via a signed URL.

The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.

Affected Packages:

python-oauth2

Issue Correction:
Run yum update python-oauth2 to update your system.

New Packages:

noarch:  
    python-oauth2-1.5.211-7.1.amzn1.noarch  
  
src:  
    python-oauth2-1.5.211-7.1.amzn1.src  

Additional References

Red Hat: CVE-2013-4346, CVE-2013-4347

Mitre: CVE-2013-4346, CVE-2013-4347

OSVersionArchitecturePackageVersionFilename
Amazon Linux1noarchpython-oauth2< 1.5.211-7.1.amzn1python-oauth2-1.5.211-7.1.amzn1.noarch.rpm

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

66.0%