python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - Mailing List, Third Party Advisory | |
References | () http://www.securitytracker.com/id/1042001 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3041 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:3505 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1260 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3725 - Third Party Advisory | |
References | () https://bugs.python.org/issue32981 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060 - Issue Tracking, Third Party Advisory | |
References | () https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1 - Product, Vendor Advisory | |
References | () https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1 - Product, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/ - | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us - Third Party Advisory | |
References | () https://usn.ubuntu.com/3817-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3817-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4306 - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4307 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - Third Party Advisory |
07 Nov 2023, 02:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-06-18 14:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1060
Mitre link : CVE-2018-1060
CVE.ORG link : CVE-2018-1060
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- ansible_tower
- enterprise_linux_workstation
python
- python
canonical
- ubuntu_linux
debian
- debian_linux
fedoraproject
- fedora
CWE