Lucene search

K
amazonAmazonALAS-2020-1429
HistoryAug 27, 2020 - 2:29 a.m.

Medium: python34, python35

2020-08-2702:29:00
alas.aws.amazon.com
12

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.011 Low

EPSS

Percentile

84.2%

Issue Overview:

In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. (CVE-2019-20907)

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.) A CRLF injection flaw was discovered in python in the way URLs are handled when doing an HTTP/HTTPS connection (e.g. through urlopen() or HTTPConnection). An attacker who can control the url parameter passed to urlopen method in the urllib/urllib2 modules can inject CRLF sequences and HTTP headers by abusing the “host” part of the URL. (CVE-2019-18348)

Affected Packages:

python34, python35

Issue Correction:
Run yum update python34 to update your system.
Run yum update python35 to update your system.

New Packages:

i686:  
    python34-debuginfo-3.4.10-1.51.amzn1.i686  
    python34-devel-3.4.10-1.51.amzn1.i686  
    python34-libs-3.4.10-1.51.amzn1.i686  
    python34-tools-3.4.10-1.51.amzn1.i686  
    python34-test-3.4.10-1.51.amzn1.i686  
    python34-3.4.10-1.51.amzn1.i686  
    python35-test-3.5.9-1.27.amzn1.i686  
    python35-debuginfo-3.5.9-1.27.amzn1.i686  
    python35-libs-3.5.9-1.27.amzn1.i686  
    python35-devel-3.5.9-1.27.amzn1.i686  
    python35-tools-3.5.9-1.27.amzn1.i686  
    python35-3.5.9-1.27.amzn1.i686  
  
src:  
    python34-3.4.10-1.51.amzn1.src  
    python35-3.5.9-1.27.amzn1.src  
  
x86_64:  
    python34-test-3.4.10-1.51.amzn1.x86_64  
    python34-3.4.10-1.51.amzn1.x86_64  
    python34-devel-3.4.10-1.51.amzn1.x86_64  
    python34-libs-3.4.10-1.51.amzn1.x86_64  
    python34-tools-3.4.10-1.51.amzn1.x86_64  
    python34-debuginfo-3.4.10-1.51.amzn1.x86_64  
    python35-devel-3.5.9-1.27.amzn1.x86_64  
    python35-debuginfo-3.5.9-1.27.amzn1.x86_64  
    python35-test-3.5.9-1.27.amzn1.x86_64  
    python35-libs-3.5.9-1.27.amzn1.x86_64  
    python35-3.5.9-1.27.amzn1.x86_64  
    python35-tools-3.5.9-1.27.amzn1.x86_64  

Additional References

Red Hat: CVE-2019-18348, CVE-2019-20907

Mitre: CVE-2019-18348, CVE-2019-20907

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.011 Low

EPSS

Percentile

84.2%