Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-1000030
HistoryFeb 08, 2018 - 12:00 a.m.

CVE-2018-1000030

2018-02-0800:00:00
ubuntu.com
ubuntu.com
12

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

0.001 Low

EPSS

Percentile

31.4%

Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a
Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable
and it appears that Python 2.7.17 and prior may also be vulnerable however
this has not been confirmed. The vulnerability lies when multiply threads
are handling large amounts of data. In both cases there is essentially a
race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is
creating the size for a buffer, but Thread1 is already writing to the
buffer without knowing how much to write. So when a large amount of data is
being processed, it is very easy to cause memory corruption using a
Heap-Buffer-Overflow. As for the Use-After-Free,
Thread3->Malloc->Thread1->Free’s->Thread2-Re-uses-Free’d Memory. The PSRT
has stated that this is not a security vulnerability due to the fact that
the attacker must be able to run code, however in some situations, such as
function as a service, this vulnerability can potentially be used by an
attacker to violate a trust boundary, as such the DWF feels this issue
deserves a CVE.

Bugs

Notes

Author Note
mdeslaur original fix caused a regression, see second commit
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchpython2.7< 2.7.6-8ubuntu0.5UNKNOWN
ubuntu16.04noarchpython2.7< 2.7.12-1ubuntu0~16.04.4UNKNOWN

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:N/A:P

0.001 Low

EPSS

Percentile

31.4%