Lucene search

K
mageiaGentoo FoundationMGASA-2017-0031
HistoryJan 30, 2017 - 1:31 a.m.

Updated python-bottle packages fix security vulnerability

2017-01-3001:31:20
Gentoo Foundation
advisories.mageia.org
9

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

57.8%

redirect() in bottle.py in bottle 0.12.10 doesnโ€™t filter a โ€œ\r\nโ€ sequence, which leads to a CRLF attack, as demonstrated by a redirect(โ€œ233\r\nSet-Cookie: name=saltโ€) call. (CVE-2016-9964)

OSVersionArchitecturePackageVersionFilename
Mageia5noarchpython-bottle<ย 0.12.11-1python-bottle-0.12.11-1.mga5

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

57.8%