Vulnerabilities Details

  • Home
  • Vulnerabilities Details

ZMC-2021.11.5.0800

python3.5: Denial of service - Remote with user interaction

Operating System:

[WIN][UNIX/LINUX]

Published:

5th November 2021

VulnerabilitiesZMC-2021.11.5.0800


=========================================================================== 
                         ZMCIRT Vulnerability Bulletin

                             ZMC-2021.11.5.0800
                       python3.5: Denial of service - Remote with user interaction
                               5th November 2021

===========================================================================

Product:           python3.5
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3737 CVE-2021-3733 

Reference:         ESB-2021.3659
                   ESB-2021.3589
                   ESB-2021.3138

Original Bulletin: 
   http://www.debian.org/lts/security/2021/dla-2808

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2808-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
November 05, 2021                           https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : python3.5
Version        : 3.5.3-1+deb9u5
CVE ID         : CVE-2021-3733 CVE-2021-3737

There were a couple of vulnerabilites found in src:python3.5, the
Python interpreter v3.5, and are as follows:

CVE-2021-3733

    The ReDoS-vulnerable regex has quadratic worst-case complexity
    and it allows cause a denial of service when identifying
    crafted invalid RFCs. This ReDoS issue is on the client side
    and needs remote attackers to control the HTTP server.

CVE-2021-3737

    HTTP client can get stuck infinitely reading len(line) < 64k
    lines after receiving a '100 Continue' HTTP response. This
    could lead to the client being a bandwidth sink for anyone
    in control of a server.

For Debian 9 stretch, these problems have been fixed in version
3.5.3-1+deb9u5.

We recommend that you upgrade your python3.5 packages.

For the detailed security status of python3.5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python3.5

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS




- --------------------------END INCLUDED TEXT--------------------





 
ZMCIRT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. ZMCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Internet Email: report@cirt.zm     
Telephone:     7070 
                ZMCIRT personnel answer during Zambian business hours 
                which are 8am to 5pm.
                On call after hours for member emergencies only.
===========================================================================

Copyright @2023 ZAMBIA CIRT