SB2019112632 - Multiple vulnerabilities in Python typed_ast



SB2019112632 - Multiple vulnerabilities in Python typed_ast

Published: November 26, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019112632
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2019-19274)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)


2) Out-of-bounds read (CVE-ID: CVE-2019-19275)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)


Remediation

Install update from vendor's website.