Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-36632
HistoryJun 25, 2023 - 12:00 a.m.

CVE-2023-36632

2023-06-2500:00:00
ubuntu.com
ubuntu.com
38
python
email
function
recursionerror
maximum recursion depth
legacy api
documentation
application input data
vulnerability
size limits
exception

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

31.9%

DISPUTED The legacy email.utils.parseaddr function in Python through
3.11.4 allows attackers to trigger “RecursionError: maximum recursion depth
exceeded while calling a Python object” via a crafted argument. This
argument is plausibly an untrusted value from an application’s input data
that was supposed to contain a name and an e-mail address. NOTE:
email.utils.parseaddr is categorized as a Legacy API in the documentation
of the Python email package. Applications should instead use the
email.parser.BytesParser or email.parser.Parser class. NOTE: the vendor’s
perspective is that this is neither a vulnerability nor a bug. The email
package is intended to have size limits and to throw an exception when
limits are exceeded; they were exceeded by the example demonstration code.

Bugs

Notes

Author Note
mdeslaur This has been disputed by upstream, as it is acting as documented.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

31.9%