[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-40839Date: (C)2021-09-23   (M)2023-12-22


The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;x2fx7f), enabling a remote attack that consumes CPU and memory.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
FEDORA-2022-02340931ec
FEDORA-2022-1033a2718b
https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75
https://github.com/aresch/rencode/pull/29
https://pypi.org/project/rencode/#history
https://seclists.org/fulldisclosure/2021/Sep/16
https://security.netapp.com/advisory/ntap-20211008-0001/

CWE    1
CWE-835
OVAL    2
oval:org.secpod.oval:def:121643
oval:org.secpod.oval:def:121648

© SecPod Technologies