First published: Thu Aug 01 2024(Updated: )
Last updated 19 November 2024
Credit: cna@python.org cna@python.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Concert Software | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 | |
debian/python2.7 | <=2.7.18-8+deb11u1 | |
debian/python3.11 | <=3.11.2-6+deb12u3 | 3.11.2-6+deb12u5 |
debian/python3.12 | 3.12.9-1 | |
debian/python3.13 | 3.13.2-1 | |
debian/python3.9 | <=3.9.2-1 | 3.9.2-1+deb11u2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6923 is considered a medium severity vulnerability due to the potential for email header injection.
To fix CVE-2024-6923, update affected versions of Python packages to the latest version that addresses this vulnerability.
CVE-2024-6923 affects Python 2.7 up to 2.7.18-8+deb11u1 and various versions of Python 3 including 3.11.2-6+deb12u3.
Yes, CVE-2024-6923 can be exploited remotely by an authenticated attacker through specially crafted email messages.
The impact of CVE-2024-6923 can lead to unauthorized actions or access due to improper handling of email headers.