First published: Tue Aug 22 2023(Updated: )
read_ints in plistlib.py in Python through 3.9.1 is vulnerable to a potential DoS attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | <3.7.7 | |
Python Python | >=3.8.0<3.8.2 | |
Python Python | >=3.9.0<3.9.1 | |
Python Python | =3.10.0-alpha1 | |
debian/python2.7 | 2.7.16-2+deb10u1 2.7.16-2+deb10u3 2.7.18-8+deb11u1 | |
debian/python3.7 | <=3.7.3-2+deb10u3 | 3.7.3-2+deb10u6 |
debian/python3.9 | 3.9.2-1 | |
ubuntu/python2.7 | <2.7.6-8ubuntu0.6+ | 2.7.6-8ubuntu0.6+ |
ubuntu/python2.7 | <2.7.17-1~18.04ubuntu1.13+ | 2.7.17-1~18.04ubuntu1.13+ |
ubuntu/python2.7 | <2.7.12-1ubuntu0~16.04.18+ | 2.7.12-1ubuntu0~16.04.18+ |
ubuntu/python3.5 | <3.5.2-2ubuntu0~16.04.13+ | 3.5.2-2ubuntu0~16.04.13+ |
ubuntu/python3.6 | <3.6.9-1~18.04ubuntu1.13+ | 3.6.9-1~18.04ubuntu1.13+ |
redhat/python | <3.10.0 | 3.10.0 |
redhat/python | <3.9.1 | 3.9.1 |
redhat/python | <3.8.7 | 3.8.7 |
redhat/python | <3.7.10 | 3.7.10 |
redhat/python | <3.6.13 | 3.6.13 |
Python Python | <3.6.13 | |
Python Python | >=3.7.0<3.7.10 | |
Python Python | >=3.8.0<3.8.7 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48564 is a vulnerability in Python through 3.9.1 that can lead to a potential denial-of-service (DoS) attack via CPU and RAM exhaustion when processing malformed Apple Property List files in binary format.
CVE-2022-48564 affects Python versions up to and including 3.9.1.
The severity level of CVE-2022-48564 is medium with a CVSS score of 6.5.
To mitigate the impact of CVE-2022-48564, it is recommended to update Python to version 3.9.2 or later.
More information about CVE-2022-48564 can be found at the following references: [Link 1](https://bugs.python.org/issue42103), [Link 2](https://security.netapp.com/advisory/ntap-20230929-0009/).