7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.6%
Python is prone to a denial of service vulnerability.
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:python:python";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.814304");
script_version("2023-07-05T05:06:18+0000");
script_tag(name:"last_modification", value:"2023-07-05 05:06:18 +0000 (Wed, 05 Jul 2023)");
script_tag(name:"creation_date", value:"2018-10-03 17:02:15 +0530 (Wed, 03 Oct 2018)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-07-29 12:15:00 +0000 (Wed, 29 Jul 2020)");
script_cve_id("CVE-2018-14647");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Python 2.7.x < 2.7.16, 3.4.x < 3.4.10, 3.5.x < 3.5.7, 3.6.x < 3.6.7, 3.7.0 Python Issue (bpo-34623) - Windows");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_python_consolidation.nasl", "os_detection.nasl");
script_mandatory_keys("python/detected", "Host/runs_windows");
script_tag(name:"summary", value:"Python is prone to a denial of service vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"The flaw exists because Python's elementtree C accelerator
fails to initialise Expat's hash salt during initialization");
script_tag(name:"impact", value:"Successful exploitation allows denial of service attacks
against Expat by constructing an XML document that would cause pathological hash collisions
in Expat's internal data structures, consuming large amounts CPU and RAM.");
script_tag(name:"affected", value:"Python versions 2.7.0 through 2.7.15, 3.4.0 through 3.4.9,
3.5.0 through 3.5.6, 3.6.0 through 3.6.6 and 3.7.0.");
script_tag(name:"solution", value:"Update to version 2.7.16, 3.4.10, 3.5.7, 3.6.7, 3.7.1 or later.");
script_xref(name:"URL", value:"https://python-security.readthedocs.io/vuln/elementree_salt.html");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/105396");
script_xref(name:"URL", value:"https://bugs.python.org/issue34623");
script_xref(name:"URL", value:"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647");
script_xref(name:"Advisory-ID", value:"bpo-34623");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (isnull(port = get_app_port(cpe: CPE)))
exit(0);
if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE, version_regex:"^[0-9]+\.[0-9]+\.[0-9]+"))
exit(0);
version = infos["version"];
location = infos["location"];
if (version_is_less(version: version, test_version: "2.7.16")) {
report = report_fixed_ver(installed_version: version, fixed_version: "2.7.16", install_path: location);
security_message(port: port, data: report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.4", test_version2: "3.4.9")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.4.10", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.5", test_version2: "3.5.6")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.5.7", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_in_range(version: version, test_version: "3.6", test_version2: "3.6.6")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.6.7", install_path: location);
security_message(port: port, data:report);
exit(0);
}
if (version_is_equal(version: version, test_version: "3.7.0")) {
report = report_fixed_ver(installed_version: version, fixed_version: "3.7.1", install_path: location);
security_message(port: port, data:report);
exit(0);
}
exit(99);
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.004 Low
EPSS
Percentile
74.6%