[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2016-724 ---- python26 python27 python34

ID: oval:org.secpod.oval:def:1600427Date: (C)2016-08-03   (M)2024-04-17
Class: PATCHFamily: unix




It was found that Python"s httplib library did not properly check HTTP header input in HTTPConnection.putheader. An attacker could use this flow to inject additional headers in a Python application that allows user provided header name or values. It was found that Python"s smtplib library did not return an exception if StartTLS fails to establish correctly in the SMTP.starttls function. An attacker with ability to launch an active man in the middle attack could strip out the STARTTLS command without generating an exception on the python SMTP client application, preventing the establishment of the TLS layer. A vulnerability was discovered in Python, in the built-in zipimporter. A specially crafted zip file placed in a module path such that it would be loaded by a later "import" statement could cause a heap overflow, leading to arbitrary code execution

Platform:
Amazon Linux AMI
Product:
python26
python27
python34
Reference:
ALAS-2016-724
CVE-2016-5699
CVE-2016-5636
CVE-2016-0772
CVE    3
CVE-2016-0772
CVE-2016-5699
CVE-2016-5636
CPE    4
cpe:/o:amazon:linux
cpe:/a:python:python34
cpe:/a:python:python27
cpe:/a:python:python26
...

© SecPod Technologies