First published: Wed Mar 07 2018(Updated: )
Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | >=3.2.0<3.4.9 | |
Python Babel Localedata | >=3.5.0<3.5.6 | |
Python Babel Localedata | >=3.6.0<3.6.5 | |
Python Babel Localedata | =3.7.0-beta1 | |
Python Babel Localedata | =3.7.0-beta2 | |
Python Babel Localedata | =3.7.0-beta3 | |
Python Babel Localedata | =3.7.0-beta4 | |
Python Babel Localedata | =3.7.0-beta5 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000117 has a high severity due to its potential for arbitrary code execution.
To fix CVE-2018-1000117, upgrade to Python versions 3.6.5 or later, or 3.7.0-beta6 or later.
CVE-2018-1000117 affects Python versions from 3.2 through 3.6.4, along with specific beta versions of 3.7.0.
Yes, CVE-2018-1000117 can be exploited via a Python script that uses the os.symlink() function on Windows.
The potential impacts of CVE-2018-1000117 include arbitrary code execution and possible escalation of privileges on affected systems.