CVE-2017-1000158

Published: Nov 17, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-1443 Aliases: GSD-2017-1000158
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,5
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0326
Percentile
0,9th
Updated

EPSS Score Trend (Last 91 Days)

190

Integer Overflow or Wraparound

Stable
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Access Control Other
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Memory) Dos: Instability Modify Memory Execute Unauthorized Code Or Commands Bypass Protection Mechanism Alter Execution Logic Dos: Resource Consumption (Cpu)
Applicable Platforms
Languages: C, Not Language-Specific
View CWE Details
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Python by Python

Version Range Affected
From 3.5.0 (inclusive)
To 3.5.5 (exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Python by Python

Version Range Affected
From 3.4.0 (inclusive)
To 3.4.8 (exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Python by Python

Version Range Affected
To 2.7.15 (exclusive)
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugs.python.org/issue30657
Issue Tracking Patch Vendor Advisory
https://bugs.python.org/issue30657
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://security.netapp.com/advisory/ntap-20230216-0001/
https://www.debian.org/security/2018/dsa-4307
http://www.securitytracker.com/id/1039890
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039890
https://bugs.python.org/issue30657
Issue Tracking Patch Vendor Advisory
https://bugs.python.org/issue30657
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://security.gentoo.org/glsa/201805-02
https://security.netapp.com/advisory/ntap-20230216-0001/
https://www.debian.org/security/2018/dsa-4307
http://www.securitytracker.com/id/1039890
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039890