Amazon Linux AMI update for python27, python34, python35, python36



| Updated: 2019-05-22
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-5010
CWE-ID CWE-476
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) NULL pointer dereference

EUVDB-ID: #VU17805

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-5010

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the X509 certificate parser of the affected software improperly handles X509 certificates with a certificate extension that uses a Certificate Revocation List (CRL) distribution point with empty distributionPoint and cRLIssuer fields. A remote attacker can send a request to initiate a Transport Layer Security (TLS) connection using an X509 certificate that submits malicious input, trigger a NULL pointer dereference condition that causes the application to crash, resulting in a DoS condition.

Mitigation

Update the affected packages.

i686:
    python27-tools-2.7.16-1.125.amzn1.i686
    python27-test-2.7.16-1.125.amzn1.i686
    python27-devel-2.7.16-1.125.amzn1.i686
    python27-2.7.16-1.125.amzn1.i686
    python27-debuginfo-2.7.16-1.125.amzn1.i686
    python27-libs-2.7.16-1.125.amzn1.i686
    python34-tools-3.4.9-1.41.amzn1.i686
    python34-3.4.9-1.41.amzn1.i686
    python34-debuginfo-3.4.9-1.41.amzn1.i686
    python34-test-3.4.9-1.41.amzn1.i686
    python34-libs-3.4.9-1.41.amzn1.i686
    python34-devel-3.4.9-1.41.amzn1.i686
    python35-test-3.5.6-1.14.amzn1.i686
    python35-3.5.6-1.14.amzn1.i686
    python35-debuginfo-3.5.6-1.14.amzn1.i686
    python35-devel-3.5.6-1.14.amzn1.i686
    python35-tools-3.5.6-1.14.amzn1.i686
    python35-libs-3.5.6-1.14.amzn1.i686
    python36-devel-3.6.8-1.11.amzn1.i686
    python36-tools-3.6.8-1.11.amzn1.i686
    python36-debug-3.6.8-1.11.amzn1.i686
    python36-debuginfo-3.6.8-1.11.amzn1.i686
    python36-test-3.6.8-1.11.amzn1.i686
    python36-libs-3.6.8-1.11.amzn1.i686
    python36-3.6.8-1.11.amzn1.i686

src:
    python27-2.7.16-1.125.amzn1.src
    python34-3.4.9-1.41.amzn1.src
    python35-3.5.6-1.14.amzn1.src
    python36-3.6.8-1.11.amzn1.src

x86_64:
    python27-debuginfo-2.7.16-1.125.amzn1.x86_64
    python27-2.7.16-1.125.amzn1.x86_64
    python27-libs-2.7.16-1.125.amzn1.x86_64
    python27-tools-2.7.16-1.125.amzn1.x86_64
    python27-devel-2.7.16-1.125.amzn1.x86_64
    python27-test-2.7.16-1.125.amzn1.x86_64
    python34-debuginfo-3.4.9-1.41.amzn1.x86_64
    python34-test-3.4.9-1.41.amzn1.x86_64
    python34-devel-3.4.9-1.41.amzn1.x86_64
    python34-3.4.9-1.41.amzn1.x86_64
    python34-libs-3.4.9-1.41.amzn1.x86_64
    python34-tools-3.4.9-1.41.amzn1.x86_64
    python35-3.5.6-1.14.amzn1.x86_64
    python35-libs-3.5.6-1.14.amzn1.x86_64
    python35-tools-3.5.6-1.14.amzn1.x86_64
    python35-test-3.5.6-1.14.amzn1.x86_64
    python35-devel-3.5.6-1.14.amzn1.x86_64
    python35-debuginfo-3.5.6-1.14.amzn1.x86_64
    python36-3.6.8-1.11.amzn1.x86_64
    python36-test-3.6.8-1.11.amzn1.x86_64
    python36-tools-3.6.8-1.11.amzn1.x86_64
    python36-devel-3.6.8-1.11.amzn1.x86_64
    python36-debug-3.6.8-1.11.amzn1.x86_64
    python36-libs-3.6.8-1.11.amzn1.x86_64
    python36-debuginfo-3.6.8-1.11.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

http://alas.aws.amazon.com/ALAS-2019-1169.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###