Buffer Overflow Affecting python2.7 package, versions <2.7.13-2+deb9u6
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-PYTHON27-1063180
- published 21 Jan 2021
- disclosed 19 Jan 2021
Introduced: 19 Jan 2021
CVE-2021-3177 Open this link in a new tabHow to fix?
Upgrade Debian:9
python2.7
to version 2.7.13-2+deb9u6 or higher.
NVD Description
Note: Versions mentioned in the description apply to the upstream python2.7
package.
See How to fix?
for Debian:9
relevant versions.
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.