Red Hat Enterprise Linux 7 update for python



Risk Medium
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2018-1060
CVE-2018-1061
CVE-2018-14647
CVE-2019-9740
CVE-2019-9947
CVE-2019-9948
CWE-ID CWE-20
CWE-611
CWE-93
CWE-749
Exploitation vector Network
Public exploit Public exploit code for vulnerability #4 is available.
Public exploit code for vulnerability #5 is available.
Public exploit code for vulnerability #6 is available.
Vulnerable software
Subscribe
Red Hat Enterprise Linux for x86_64 - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, big endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux EUS Compute Node
Operating systems & Components / Operating system

python (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Improper input validation

EUVDB-ID: #VU12283

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1060

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on he target system.

The weakness exists due to the way catastrophic backtracking was implemented in apop() method in pop3lib. A remote attacker can cause the service to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper input validation

EUVDB-ID: #VU12282

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1061

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on he target system.

The weakness exists due to the way catastrophic backtracking was implemented in python's difflib.IS_LINE_JUNK method difflib. A remote attacker can cause the service to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) XXE attack

EUVDB-ID: #VU15760

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-14647

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a remote attacker to conduct XXE-attack.

The vulnerability exists due to improper handling of XML External Entities (XXEs) when parsing an XML file. A remote attacker can trick the victim into open an XML file that submits malicious input, trigger pathological hash collisions in Expat's internal data structures, consume large amounts CPU and RAM, and cause a denial of service (DoS) condition.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) CRLF injection

EUVDB-ID: #VU18829

Risk: Medium

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-9740

CWE-ID: CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform CRLF injection attacks.

The vulnerability exists within urllib2 implementation for Python 2.x and urllib3 implementation for Python 3.x when processing the path component of a URL after the "?" character within the urllib.request.urlopen() call. A remote attacker with ability to control URL, passed to the application, can use CRLF sequences to split the HTTP request and inject arbitrary HTTP headers into request, made by the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

5) CRLF injection

EUVDB-ID: #VU18828

Risk: Medium

CVSSv3.1: 4.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-9947

CWE-ID: CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform CRLF injection attacks.

The vulnerability exists within urllib2 implementation for Python 2.x and urllib3 implementation for Python 3.x when processing the path component of a URL that lacks the "?" character within the urllib.request.urlopen() call. A remote attacker with ability to control URL, passed to the application, can use CRLF sequences to split the HTTP request and inject arbitrary HTTP headers into request, made by the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

6) Exposed dangerous method or function

EUVDB-ID: #VU18827

Risk: Medium

CVSSv3.1: 6.1 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2019-9948

CWE-ID: CWE-749 - Exposed Dangerous Method or Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to urllib implementation in Python 2.x supports the local_file: scheme. An attacker with ability to control input data, such as URL, can bypass protection mechanisms that blacklist file: URIs and view contents of arbitrary file on the system.

PoC:

urllib.urlopen('local_file:///etc/passwd')

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux for x86_64 - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.5

python (Red Hat package): 2.7.5-69.el7_5 - 2.7.5-70.el7_5

Red Hat Enterprise Linux EUS Compute Node: 7.5

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2020:1268


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###