Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-8315 |
CWE-ID | CWE-427 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
python3 (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU24843
Risk: High
CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-8315
CWE-ID:
CWE-427 - Uncontrolled Search Path Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to direct calls to "LoadLibraryW()" in "getpathp.c" without any "LOAD_LIBRARY_SEARCH*" flags. A remote attacker can use a malicious copy of api-ms-win-core-path-l1-1-0.dll, which being loaded and used instead of the system's copy and execute arbitrary code on victim's system.
MitigationInstall update from vendor's website.
Vulnerable software versionspython3 (Alpine package): 3.7.7-r0
External linkshttp://git.alpinelinux.org/aports/commit/?id=21a5b7dd0924932b20512155471ee45dada0abf4
http://git.alpinelinux.org/aports/commit/?id=5fbbd588ac1a7f3a4d779fe13c37b9ab4d65e259
http://git.alpinelinux.org/aports/commit/?id=3d60659100e95bd6d05aaceaef7aa2a1410107d8
http://git.alpinelinux.org/aports/commit/?id=8135de912b23c9bd9649fa7b6a59ec455529b7af
http://git.alpinelinux.org/aports/commit/?id=99c195369d53843a8a4f186257072600a773bbde
http://git.alpinelinux.org/aports/commit/?id=b98b6bd76527ff7e722baece7a94e43ddb008a9d
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.