ALAS2PYTHON3.8-2023-009 --- python38ID: oval:org.secpod.oval:def:1701674 | Date: (C)2023-10-26 (M)2024-02-07 |
Class: PATCH | Family: unix |
The CryptProtectMemory function in cng.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1, when the CRYPTPROTECTMEMORY_SAME_LOGON option is used, does not check an impersonation token's level, which allows local users to bypass intended decryption restrictions by leveraging a service that has a named-pipe planting vulnerability or uses world-readable shared memory for encrypted data, aka "CNG Security Feature Bypass Vulnerability" or MSRC ID 20707. In Python3's Lib/test/multibytecodec_support.py CJK codec tests call eval on content retrieved via HTTP. A flaw was found in python-ipaddress. Improper input validation of octal strings in stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. The highest threat from this vulnerability is to data integrity and system availability