7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.6%
Python’s elementtree C accelerator failed to initialise Expat’s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat’s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
Vendor | Product | Version | CPE |
---|---|---|---|
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
python | jython | * | cpe:2.3:a:python:jython:*:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
www.securityfocus.com/bid/105396
www.securitytracker.com/id/1041740
access.redhat.com/errata/RHSA-2019:1260
access.redhat.com/errata/RHSA-2019:2030
access.redhat.com/errata/RHSA-2019:3725
bugs.python.org/issue34623
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2019/06/msg00022.html
lists.debian.org/debian-lts-announce/2019/06/msg00023.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
usn.ubuntu.com/3817-1/
usn.ubuntu.com/3817-2/
www.debian.org/security/2018/dsa-4306
www.debian.org/security/2018/dsa-4307
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.9 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.6%