Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2019-5010): Python vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2019-5010): Python vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
01/31/2019
Created
09/11/2019
Added
09/10/2019
Modified
09/11/2019

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From USN-4127-2:

USN-4127-1 fixed several vulnerabilities in Python. This update provides

the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

It was discovered that Python incorrectly handled certain pickle files. An

attacker could possibly use this issue to consume memory, leading to a

denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2018-20406)

It was discovered that Python incorrectly validated the domain when

handling cookies. An attacker could possibly trick Python into sending

cookies to the wrong domain. (CVE-2018-20852)

Jonathan Birch and Panayiotis Panayiotou discovered that Python incorrectly

handled Unicode encoding during NFKC normalization. An attacker could

possibly use this issue to obtain sensitive information. (CVE-2019-9636,

CVE-2019-10160)

Colin Read and Nicolas Edet discovered that Python incorrectly handled

parsing certain X509 certificates. An attacker could possibly use this

issue to cause Python to crash, resulting in a denial of service. This

issue only affected Ubuntu 14.04 ESM. (CVE-2019-5010)

It was discovered that Python incorrectly handled certain urls. A remote

attacker could possibly use this issue to perform CRLF injection attacks.

(CVE-2019-9740, CVE-2019-9947)

Sihoon Lee discovered that Python incorrectly handled the local_file:

scheme. A remote attacker could possibly use this issue to bypass blacklist

meschanisms. (CVE-2019-9948)

Solution(s)

  • ubuntu-upgrade-python2-7
  • ubuntu-upgrade-python2-7-minimal
  • ubuntu-upgrade-python3-4
  • ubuntu-upgrade-python3-4-minimal
  • ubuntu-upgrade-python3-5
  • ubuntu-upgrade-python3-5-minimal
  • ubuntu-upgrade-python3-6
  • ubuntu-upgrade-python3-6-minimal
  • ubuntu-upgrade-python3-7
  • ubuntu-upgrade-python3-7-minimal

References

  • ubuntu-upgrade-python2-7
  • ubuntu-upgrade-python2-7-minimal
  • ubuntu-upgrade-python3-4
  • ubuntu-upgrade-python3-4-minimal
  • ubuntu-upgrade-python3-5
  • ubuntu-upgrade-python3-5-minimal
  • ubuntu-upgrade-python3-6
  • ubuntu-upgrade-python3-6-minimal
  • ubuntu-upgrade-python3-7
  • ubuntu-upgrade-python3-7-minimal

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;