CVE-2018-14647

MEDIUM

Description

Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. Python 3.8, 3.7, 3.6, 3.5, 3.4, 2.7 are believed to be vulnerable.

References

http://www.securityfocus.com/bid/105396

http://www.securitytracker.com/id/1041740

https://access.redhat.com/errata/RHSA-2019:1260

https://bugs.python.org/issue34623

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647

https://lists.fedoraproject.org/archives/list/[email protected]/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/

https://usn.ubuntu.com/3817-1/

https://usn.ubuntu.com/3817-2/

https://www.debian.org/security/2018/dsa-4306

https://www.debian.org/security/2018/dsa-4307

Details

Source: MITRE

Published: 2018-09-25

Updated: 2019-05-22

Type: CWE-399

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3.0

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH