vulnerability

Oracle Solaris 11: CVE-2016-10739: Vulnerability in Python, Python 2.7

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
2019-01-21
Added
2021-01-19
Modified
2022-02-17

Description

In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.

Solution(s)

oracle-solaris-11-4-upgrade-library-python-tkinter-27-2-7-18-11-4-24-0-1-75-1oracle-solaris-11-4-upgrade-library-python-tkinter-34-3-4-10-11-4-21-0-1-69-0oracle-solaris-11-4-upgrade-library-python-tkinter-35-3-5-9-11-4-21-0-1-69-0oracle-solaris-11-4-upgrade-library-python-tkinter-37-3-7-5-11-4-24-0-1-75-1oracle-solaris-11-4-upgrade-runtime-python-27-2-7-18-11-4-24-0-1-75-1oracle-solaris-11-4-upgrade-runtime-python-27-tests-2-7-18-11-4-24-0-1-75-1oracle-solaris-11-4-upgrade-runtime-python-34-3-4-10-11-4-21-0-1-69-0oracle-solaris-11-4-upgrade-runtime-python-35-3-5-9-11-4-21-0-1-69-0oracle-solaris-11-4-upgrade-runtime-python-37-3-7-5-11-4-24-0-1-75-1
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.