cvelist/2018/14xxx/CVE-2018-14647.json
2019-08-06 17:00:50 +00:00

140 lines
4.8 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-14647",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Python",
"version": {
"version_data": [
{
"version_value": "3.8, 3.7, 3.6, 3.5, 3.4, 2.7"
}
]
}
}
]
},
"vendor_name": "The Python Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-665"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-335"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4306",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4306"
},
{
"name": "USN-3817-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3817-2/"
},
{
"name": "1041740",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041740"
},
{
"name": "105396",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105396"
},
{
"name": "DSA-4307",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4307"
},
{
"name": "https://bugs.python.org/issue34623",
"refsource": "MISC",
"url": "https://bugs.python.org/issue34623"
},
{
"name": "USN-3817-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3817-1/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-0c91ce7b3c",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:1260",
"url": "https://access.redhat.com/errata/RHSA-2019:1260"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html"
},
{
"refsource": "MLIST",
"name": "[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update",
"url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:2030",
"url": "https://access.redhat.com/errata/RHSA-2019:2030"
}
]
}
}