Vulnerability identifier: #VU32881
Vulnerability risk: Medium
CVSSv3.1:
CVE-ID:
CWE-ID:
Exploitation vector: Network
Exploit availability:
Vulnerable software:
Python
Universal components / Libraries /
Scripting languages
Vendor: Python.org
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop In Lib/tarfile.py in Python. A remote attacker can create a specially crafted TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Python: 3.8.0 - 3.8.3
Fixed software versions
CPE
External links
http://bugs.python.org/issue39017
http://github.com/python/cpython/pull/21454
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/
http://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/
http://usn.ubuntu.com/4428-1/
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?