pysec-2022-160
Vulnerability from pysec
Published
2022-03-03 21:15
Modified
2022-03-10 17:35
Details

Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as nc -rv localhost 22 < /dev/zero. A patch is available in version 22.2.0. There are currently no known workarounds.

Impacted products
Name purl
twisted pkg:pypi/twisted



{
   affected: [
      {
         package: {
            ecosystem: "PyPI",
            name: "twisted",
            purl: "pkg:pypi/twisted",
         },
         ranges: [
            {
               events: [
                  {
                     introduced: "0",
                  },
                  {
                     fixed: "89c395ee794e85a9657b112c4351417850330ef9",
                  },
               ],
               repo: "https://github.com/twisted/twisted",
               type: "GIT",
            },
            {
               events: [
                  {
                     introduced: "21.7.0",
                  },
                  {
                     fixed: "22.2.0",
                  },
               ],
               type: "ECOSYSTEM",
            },
         ],
         versions: [
            "21.7.0",
            "22.1.0",
            "22.1.0rc1",
            "22.2.0rc1",
         ],
      },
   ],
   aliases: [
      "CVE-2022-21716",
      "GHSA-rv6r-3f5q-9rgx",
   ],
   details: "Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.",
   id: "PYSEC-2022-160",
   modified: "2022-03-10T17:35:00.079970Z",
   published: "2022-03-03T21:15:00Z",
   references: [
      {
         type: "FIX",
         url: "https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9",
      },
      {
         type: "ADVISORY",
         url: "https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx",
      },
      {
         type: "WEB",
         url: "https://twistedmatrix.com/trac/ticket/10284",
      },
      {
         type: "WEB",
         url: "https://github.com/twisted/twisted/releases/tag/twisted-22.2.0",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.