First published: Mon Jun 23 2014(Updated: )
Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python2.7 | <=2.7.3-6<=2.7.3-6+deb7u2 | |
redhat/python | <2.7.7 | 2.7.7 |
redhat/python | <3.3.6 | 3.3.6 |
redhat/python | <3.4.1 | 3.4.1 |
debian/python2.7 | 2.7.18-8+deb11u1 | |
Python Programming Language | >=2.7.0<2.7.7 | |
Python Programming Language | >=3.0.0<3.2.6 | |
Python Programming Language | >=3.3.0<3.3.6 | |
Python Programming Language | >=3.4.0<3.4.1 | |
simplejson | <2.6.1 | |
openSUSE | =13.1 | |
openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4616 has a medium severity due to the potential for context-dependent memory exposure.
To fix CVE-2014-4616, update Python to version 2.7.7 or later, or to 3.3.6 or later.
CVE-2014-4616 affects Python versions from 2.7.0 to 2.7.3, and 3.0.0 to 3.4.0.
Yes, Simplejson versions before 2.6.1 are affected by CVE-2014-4616.
CVE-2014-4616 may allow attackers to read arbitrary process memory, potentially exposing sensitive data.