SB2014042203 - Input validation error in Python
Published: April 22, 2014 Updated: August 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2013-7338)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
Remediation
Install update from vendor's website.
References
- http://bugs.python.org/issue20078
- http://hg.python.org/cpython/rev/79ea4ce431b1
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html
- http://seclists.org/oss-sec/2014/q1/592
- http://seclists.org/oss-sec/2014/q1/595
- http://www.securityfocus.com/bid/65179
- http://www.securitytracker.com/id/1029973
- https://docs.python.org/3.3/whatsnew/changelog.html
- https://security.gentoo.org/glsa/201503-10
- https://support.apple.com/kb/HT205031