pysec-2022-160
Vulnerability from pysec
Published
2022-03-03 21:15
Modified
2022-03-10 17:35
Details
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as nc -rv localhost 22 < /dev/zero
. A patch is available in version 22.2.0. There are currently no known workarounds.
Impacted products
Name | purl |
---|---|
twisted | pkg:pypi/twisted |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "twisted", purl: "pkg:pypi/twisted", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "89c395ee794e85a9657b112c4351417850330ef9", }, ], repo: "https://github.com/twisted/twisted", type: "GIT", }, { events: [ { introduced: "21.7.0", }, { fixed: "22.2.0", }, ], type: "ECOSYSTEM", }, ], versions: [ "21.7.0", "22.1.0", "22.1.0rc1", "22.2.0rc1", ], }, ], aliases: [ "CVE-2022-21716", "GHSA-rv6r-3f5q-9rgx", ], details: "Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.", id: "PYSEC-2022-160", modified: "2022-03-10T17:35:00.079970Z", published: "2022-03-03T21:15:00Z", references: [ { type: "FIX", url: "https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9", }, { type: "ADVISORY", url: "https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx", }, { type: "WEB", url: "https://twistedmatrix.com/trac/ticket/10284", }, { type: "WEB", url: "https://github.com/twisted/twisted/releases/tag/twisted-22.2.0", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.