First published: Fri Nov 17 2017(Updated: )
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/python2.7 | 2.7.16-2+deb10u1 2.7.16-2+deb10u3 2.7.18-8+deb11u1 | |
Python 2.7 | <2.7.15 | |
Python 2.7 | >=3.4.0<3.4.8 | |
Python 2.7 | >=3.5.0<3.5.5 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000158 has a high severity rating due to the potential for a heap-based buffer overflow and arbitrary code execution.
To fix CVE-2017-1000158, upgrade to Python versions 2.7.16 or higher.
Python versions up to 2.7.13, as well as certain versions from 3.4.0 to 3.4.8 and from 3.5.0 to 3.5.5, are affected by CVE-2017-1000158.
The impact of CVE-2017-1000158 includes possible arbitrary code execution due to an integer overflow vulnerability.
Yes, CVE-2017-1000158 is considered exploitable remotely if an attacker can send specially crafted input to the affected application.