[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2PYTHON3.8-2023-009 --- python38

ID: oval:org.secpod.oval:def:1701674Date: (C)2023-10-26   (M)2024-02-07
Class: PATCHFamily: unix




The CryptProtectMemory function in cng.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1, when the CRYPTPROTECTMEMORY_SAME_LOGON option is used, does not check an impersonation token's level, which allows local users to bypass intended decryption restrictions by leveraging a service that has a named-pipe planting vulnerability or uses world-readable shared memory for encrypted data, aka "CNG Security Feature Bypass Vulnerability" or MSRC ID 20707. In Python3's Lib/test/multibytecodec_support.py CJK codec tests call eval on content retrieved via HTTP. A flaw was found in python-ipaddress. Improper input validation of octal strings in stdlib ipaddress allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on Python stdlib ipaddress. The highest threat from this vulnerability is to data integrity and system availability

Platform:
Amazon Linux 2
Product:
python38
Reference:
ALAS2PYTHON3.8-2023-009
CVE-2015-0010
CVE-2020-27619
CVE-2021-29921
CVE    3
CVE-2021-29921
CVE-2015-0010
CVE-2020-27619
CPE    2
cpe:/a:thekelleys:plach
cpe:/o:amazon:linux:2

© SecPod Technologies