Lucene search

K
gentooGentoo FoundationGLSA-201512-02
HistoryDec 17, 2015 - 12:00 a.m.

IPython: User-assisted execution of arbitrary code

2015-12-1700:00:00
Gentoo Foundation
security.gentoo.org
15

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%

Background

IPython is an advanced interactive shell for Python.

Description

IPython does not properly check the MIME type of a file.

Impact

A remote attacker could entice a user to open a specially crafted text file using IPython, possibly resulting in execution of arbitrary JavaScript with the privileges of the process.

Workaround

There is no known workaround at this time.

Resolution

All IPython users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-python/ipython-3.2.1-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-python/ipython< 3.2.1-r1UNKNOWN

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%