Out-of-bounds Read Affecting python/typed_ast package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.59% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PYTHONTYPEDAST-2367427
  • published26 Jan 2022
  • disclosed26 Nov 2019
  • creditUnknown

Introduced: 26 Nov 2019

CVE-2019-19274  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

There is no fixed version for python/typed_ast.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

CVSS Scores

version 3.1