Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-7040
HistoryMay 19, 2014 - 12:00 a.m.

CVE-2013-7040

2014-05-1900:00:00
ubuntu.com
ubuntu.com
10

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.4%

Python 2.7 before 3.4 only uses the last eight bits of the prefix to
randomize hash values, which causes it to compute hash values without
restricting the ability to trigger hash collisions predictably and makes it
easier for context-dependent attackers to cause a denial of service (CPU
consumption) via crafted input to an application that maintains a hash
table. NOTE: this vulnerability exists because of an incomplete fix for
CVE-2012-1150.

Bugs

Notes

Author Note
mdeslaur This is being fixed upstream by changing the hashing algorithm to SipHash in python 3.4. See http://www.python.org/dev/peps/pep-0456/ Upstream has no intention of backporting this change to stable releases. We will not be fixing this in older releases.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.4%