CVE-2018-1060

python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html Mailing List Third Party Advisory
http://www.securitytracker.com/id/1042001 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2019:0327 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3041 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1260 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3725 Third Party Advisory
https://bugs.python.org/issue32981 Exploit Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 Issue Tracking Third Party Advisory
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 Product Vendor Advisory
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 Product Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us Third Party Advisory
https://usn.ubuntu.com/3817-1/ Third Party Advisory
https://usn.ubuntu.com/3817-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4306 Third Party Advisory
https://www.debian.org/security/2018/dsa-4307 Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html Mailing List Third Party Advisory
http://www.securitytracker.com/id/1042001 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2019:0327 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3041 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1260 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3725 Third Party Advisory
https://bugs.python.org/issue32981 Exploit Issue Tracking Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 Issue Tracking Third Party Advisory
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 Product Vendor Advisory
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 Product Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us Third Party Advisory
https://usn.ubuntu.com/3817-1/ Third Party Advisory
https://usn.ubuntu.com/3817-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4306 Third Party Advisory
https://www.debian.org/security/2018/dsa-4307 Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - Mailing List, Third Party Advisory
References () http://www.securitytracker.com/id/1042001 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1042001 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3041 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3041 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3505 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3505 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1260 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1260 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:3725 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:3725 - Third Party Advisory
References () https://bugs.python.org/issue32981 - Exploit, Issue Tracking, Vendor Advisory () https://bugs.python.org/issue32981 - Exploit, Issue Tracking, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 - Issue Tracking, Third Party Advisory
References () https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 - Product, Vendor Advisory () https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 - Product, Vendor Advisory
References () https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 - Product, Vendor Advisory () https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 - Product, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ -
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us - Third Party Advisory
References () https://usn.ubuntu.com/3817-1/ - Third Party Advisory () https://usn.ubuntu.com/3817-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3817-2/ - Third Party Advisory () https://usn.ubuntu.com/3817-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4306 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4306 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4307 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4307 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujan2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Third Party Advisory

07 Nov 2023, 02:55

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/', 'name': 'FEDORA-2019-51f1e08207', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/', 'name': 'FEDORA-2019-6e1938a3c5', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/', 'name': 'FEDORA-2019-cf725dd20b', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ -

Information

Published : 2018-06-18 14:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1060

Mitre link : CVE-2018-1060

CVE.ORG link : CVE-2018-1060


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • ansible_tower
  • enterprise_linux_workstation

python

  • python

canonical

  • ubuntu_linux

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo