CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
71.4%
Issue Overview:
An issue was discovered in urllib2 in Python 2.x and urllib in Python 3.x. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. (CVE-2019-9740, CVE-2019-9947)
Affected Packages:
python34
Issue Correction:
Run yum update python34 to update your system.
New Packages:
i686:
python34-3.4.10-1.45.amzn1.i686
python34-devel-3.4.10-1.45.amzn1.i686
python34-test-3.4.10-1.45.amzn1.i686
python34-libs-3.4.10-1.45.amzn1.i686
python34-tools-3.4.10-1.45.amzn1.i686
python34-debuginfo-3.4.10-1.45.amzn1.i686
src:
python34-3.4.10-1.45.amzn1.src
x86_64:
python34-libs-3.4.10-1.45.amzn1.x86_64
python34-test-3.4.10-1.45.amzn1.x86_64
python34-3.4.10-1.45.amzn1.x86_64
python34-tools-3.4.10-1.45.amzn1.x86_64
python34-devel-3.4.10-1.45.amzn1.x86_64
python34-debuginfo-3.4.10-1.45.amzn1.x86_64
Red Hat: CVE-2019-9740, CVE-2019-9947
Mitre: CVE-2019-9740, CVE-2019-9947
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | python34 | < 3.4.10-1.45.amzn1 | python34-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-devel | < 3.4.10-1.45.amzn1 | python34-devel-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-test | < 3.4.10-1.45.amzn1 | python34-test-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-libs | < 3.4.10-1.45.amzn1 | python34-libs-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-tools | < 3.4.10-1.45.amzn1 | python34-tools-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | python34-debuginfo | < 3.4.10-1.45.amzn1 | python34-debuginfo-3.4.10-1.45.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | python34-libs | < 3.4.10-1.45.amzn1 | python34-libs-3.4.10-1.45.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | python34-test | < 3.4.10-1.45.amzn1 | python34-test-3.4.10-1.45.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | python34 | < 3.4.10-1.45.amzn1 | python34-3.4.10-1.45.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | python34-tools | < 3.4.10-1.45.amzn1 | python34-tools-3.4.10-1.45.amzn1.x86_64.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
71.4%