Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-20477
HistoryFeb 19, 2020 - 12:00 a.m.

CVE-2019-20477

2020-02-1900:00:00
ubuntu.com
ubuntu.com
12

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.175 Low

EPSS

Percentile

96.1%

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and
load_all functions because of a class deserialization issue, e.g., Popen is
a class in the subprocess module. NOTE: this issue exists because of an
incomplete fix for CVE-2017-18342.

Notes

Author Note
mdeslaur CVE-2017-18342 resulted in the load() function being deprecated in 5.1+ in eoan and later. It did not get fixed in previous release because of compatibility issues. This CVE therefore only really applies to eoan and later.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.175 Low

EPSS

Percentile

96.1%