fkie_cve-2020-15523
Vulnerability from fkie_nvd
Published
2020-07-04 23:15
Modified
2024-11-21 05:05
Severity ?
Summary
In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.python.org/issue29778 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://github.com/python/cpython/pull/21297 | Patch, Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20210312-0004/ | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.python.org/issue29778 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/python/cpython/pull/21297 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20210312-0004/ | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
python | python | * | |
python | python | * | |
python | python | * | |
python | python | * | |
python | python | 3.8.4 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
python | python | 3.9.0 | |
microsoft | windows | - | |
netapp | snapcenter | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", matchCriteriaId: "190C1D3B-648D-46B5-AB7E-8575DB03585B", versionEndExcluding: "3.5.10", versionStartIncluding: "3.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", matchCriteriaId: "7EB6A6FC-6C82-4543-8DAA-96FF2BACDB5C", versionEndExcluding: "3.6.12", versionStartIncluding: "3.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", matchCriteriaId: "045171F0-A76D-4385-B2AE-51479B425C45", versionEndExcluding: "3.7.9", versionStartIncluding: "3.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", matchCriteriaId: "E9409BD5-670F-4C69-A4D2-ACF9AD8F335B", versionEndExcluding: "3.8.4", versionStartIncluding: "3.8.0", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.8.4:rc1:*:*:*:*:*:*", matchCriteriaId: "25F65784-2F53-467D-8E72-02F619F1D73F", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "2E45B3B6-8458-4C88-99FC-C21D6987AA41", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "D05F0EE6-213A-48AF-8217-502681E10421", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "58906E55-8502-42DC-9203-AC6B337A7A85", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "80D043C7-0760-4B00-A487-533E1CF86AC7", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "73519BF7-7F38-441D-AA72-574AD94E7E5E", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:alpha6:*:*:*:*:*:*", matchCriteriaId: "D498F6E9-511C-451C-A39E-8514774D9F46", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:beta1:*:*:*:*:*:*", matchCriteriaId: "D803324B-B2E7-47FA-8E2C-E456B6940FEE", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:beta2:*:*:*:*:*:*", matchCriteriaId: "4F5113CE-A28F-4319-8395-FB96542D8FFD", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:beta3:*:*:*:*:*:*", matchCriteriaId: "DCE9E749-8464-4753-86E6-CFE9FB834032", vulnerable: true, }, { criteria: "cpe:2.3:a:python:python:3.9.0:beta4:*:*:*:*:*:*", matchCriteriaId: "37D52E7C-0317-476B-B5EB-2A5FAD567144", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", matchCriteriaId: "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.", }, { lang: "es", value: "En Python versiones 3.6 hasta 3.6.10, 3.7 hasta 3.7.8, 3.8 hasta 3.8.4rc1 y 3.9 hasta 3.9.0b4 en Windows, se puede usar una python3.dll de tipo caballo de Troya en los casos en que CPython está incorporado en una aplicación nativa. Esto se produce porque python3X.dll puede usar una ruta de búsqueda no válida para cargar python3.dll (después de que haya sido usado Py_SetPath). NOTA: este problema NO PUEDE ocurrir cuando se usa python.exe desde una instalación estándar (no incorporada) de Python en Windows", }, ], id: "CVE-2020-15523", lastModified: "2024-11-21T05:05:41.497", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-07-04T23:15:10.313", references: [ { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.python.org/issue29778", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/python/cpython/pull/21297", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210312-0004/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Vendor Advisory", ], url: "https://bugs.python.org/issue29778", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/python/cpython/pull/21297", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20210312-0004/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, { lang: "en", value: "CWE-908", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.