CVE-2019-16056

high

Description

An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.

References

https://bugs.python.org/issue34155

https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9

https://lists.fedoraproject.org/archives/list/[email protected]/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/

https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html

https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/

https://lists.fedoraproject.org/archives/list/[email protected]/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/

https://lists.fedoraproject.org/archives/list/[email protected]/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/

https://security.netapp.com/advisory/ntap-20190926-0005/

https://usn.ubuntu.com/4151-1/

https://usn.ubuntu.com/4151-2/

http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html

http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/

https://lists.fedoraproject.org/archives/list/[email protected]/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/

https://lists.fedoraproject.org/archives/list/[email protected]/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html

https://access.redhat.com/errata/RHSA-2019:3725

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/

https://lists.fedoraproject.org/archives/list/[email protected]/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/

https://lists.fedoraproject.org/archives/list/[email protected]/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/

https://lists.fedoraproject.org/archives/list/[email protected]/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/

https://lists.fedoraproject.org/archives/list/[email protected]/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/

https://access.redhat.com/errata/RHSA-2019:3948

https://lists.fedoraproject.org/archives/list/packa[email protected]/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/

https://lists.fedoraproject.org/archives/list/[email protected]/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/

http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html

https://www.oracle.com/security-alerts/cpuapr2020.html

https://www.oracle.com/security-alerts/cpujul2020.html

https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html

https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E

https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html

Details

Source: MITRE

Published: 2019-09-06

Updated: 2023-02-28

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH