CVE-2016-4000

Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
References
Link Resource
http://bugs.jython.org/issue2454 Vendor Advisory
http://www.debian.org/security/2017/dsa-3893 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105647
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859 Mailing List Third Party Advisory
https://hg.python.org/jython/file/v2.7.1rc1/NEWS Third Party Advisory
https://hg.python.org/jython/rev/d06e29d100c0 Patch Third Party Advisory
https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2016-4000 Third Party Advisory
https://security.gentoo.org/glsa/201710-28
https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451 Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
http://bugs.jython.org/issue2454 Vendor Advisory
http://www.debian.org/security/2017/dsa-3893 Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105647
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859 Mailing List Third Party Advisory
https://hg.python.org/jython/file/v2.7.1rc1/NEWS Third Party Advisory
https://hg.python.org/jython/rev/d06e29d100c0 Patch Third Party Advisory
https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E
https://security-tracker.debian.org/tracker/CVE-2016-4000 Third Party Advisory
https://security.gentoo.org/glsa/201710-28
https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451 Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:jython_project:jython:2.7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:51

Type Values Removed Values Added
References () http://bugs.jython.org/issue2454 - Vendor Advisory () http://bugs.jython.org/issue2454 - Vendor Advisory
References () http://www.debian.org/security/2017/dsa-3893 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3893 - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html -
References () http://www.securityfocus.com/bid/105647 - () http://www.securityfocus.com/bid/105647 -
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859 - Mailing List, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859 - Mailing List, Third Party Advisory
References () https://hg.python.org/jython/file/v2.7.1rc1/NEWS - Third Party Advisory () https://hg.python.org/jython/file/v2.7.1rc1/NEWS - Third Party Advisory
References () https://hg.python.org/jython/rev/d06e29d100c0 - Patch, Third Party Advisory () https://hg.python.org/jython/rev/d06e29d100c0 - Patch, Third Party Advisory
References () https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E - () https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E -
References () https://security-tracker.debian.org/tracker/CVE-2016-4000 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2016-4000 - Third Party Advisory
References () https://security.gentoo.org/glsa/201710-28 - () https://security.gentoo.org/glsa/201710-28 -
References () https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451 - Third Party Advisory () https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2020.html - () https://www.oracle.com/security-alerts/cpuapr2020.html -
References () https://www.oracle.com/security-alerts/cpujan2020.html - () https://www.oracle.com/security-alerts/cpujan2020.html -
References () https://www.oracle.com/security-alerts/cpujul2020.html - () https://www.oracle.com/security-alerts/cpujul2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html -
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -
References () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -

07 Nov 2023, 02:32

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E', 'name': '[infra-devnull] 20190402 [GitHub] [flink] aloyszhang opened pull request #8100: [FLINK-12082] Bump up the jython-standalone version', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533%40%3Cdevnull.infra.apache.org%3E -

Information

Published : 2017-07-06 16:29

Updated : 2024-11-21 02:51


NVD link : CVE-2016-4000

Mitre link : CVE-2016-4000

CVE.ORG link : CVE-2016-4000


JSON object : View

Products Affected

debian

  • debian_linux

jython_project

  • jython
CWE
CWE-502

Deserialization of Untrusted Data