SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Python Vendors:   Python.org
Python elementtree C Accelerator Lets Remote Users Consume Excessive CPU and Memory Resources
SecurityTracker Alert ID:  1041740
SecurityTracker URL:  http://securitytracker.com/id/1041740
CVE Reference:   CVE-2018-14647   (Links to External Site)
Date:  Sep 29 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Python. A remote user can consume excessive CPU and memory on the target system in certain cases.

The elementtree C accelerator does not call XML_SetHashSalt() to initialize Expat's hash salt during initialization. A remote user can create a specially crafted XML document that, when loaded by the target application, will trigger hash collisions in the Expat internal data structures to consume excessive CPU and memory resources on the target system.

The Python Security Response Team reported this vulnerability.

Impact:   A remote user can consume excessive CPU and memory resources on the target system.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://bugs.python.org/issue34623

Vendor URL:  bugs.python.org/issue34623 (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 13 2018 (Ubuntu Issues Fix) Python elementtree C Accelerator Lets Remote Users Consume Excessive CPU and Memory Resources
Ubuntu has issued a fix for Ubuntu Linux 14.04 LTS, 16.04 LTS, and 18.04 LTS.
Nov 16 2018 (Ubuntu Issues Fix) Python elementtree C Accelerator Lets Remote Users Consume Excessive CPU and Memory Resources
Ubuntu has issued a fix for Ubuntu Linux 12.04 ESM.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC