Kaspersky ID:
KLA10866
Дата обнаружения:
09/02/2016
Обновлено:
22/01/2024

Описание

Multiple serious vulnerabilities have been found in CPython (Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2. Malicious users can exploit these vulnerabilities to bypass the TLS protections, inject arbitrary HTTP headers or have unspecified impact.

Below is a complete list of vulnerabilities:

  1. CRLF injection vulnerability can be exploited to inject arbitrary HTTP headers via CRLF sequences in a URL.
  2. Integer overflow can be exploited via a negative data size value, which triggers a heap-based buffer overflow.
  3. TLS stripping vulnerability can be exploited by man-in-the-middleattackers to bypass the TLS protections via leveraging a network position between the client and the registry to block the StartTLS command («StartTLS stripping attack»).

Technical details

  1. CRLF injection vulnerability is in the HTTPConnection.putheader function in urllib2 and urllib in CPython.
  2. Integer overflow occurs in the get_data function in file zipimport.c from smtplib library in CPython.
  3. TLS stripping vulnerability occurs in the smtplib library in CPython.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Связанные продукты

Список CVE

  • CVE-2016-5699
    warning
  • CVE-2016-5636
    critical
  • CVE-2016-0772
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.