CVE-2013-7338

CVSS V2 High 7.1 CVSS V3 None
Description
Python before 3.3.4 RC1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a file size value larger than the size of the zip file to the (1) ZipExtFile.read, (2) ZipExtFile.read(n), (3) ZipExtFile.readlines, (4) ZipFile.extract, or (5) ZipFile.extractall function.
Overview
  • CVE ID
  • CVE-2013-7338
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-04-22T14:23:34
  • Last Modified Date
  • 2019-08-21T12:41:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:python:python:3.3.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:alpha1:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:alpha2:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:alpha3:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:alpha4:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.0:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.1:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.3:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:python:python:3.3.3:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.10.4
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.1
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 6.9
References
Reference URL Reference Tags
http://bugs.python.org/issue20078 Exploit Patch Vendor Advisory
http://www.securitytracker.com/id/1029973 Third Party Advisory VDB Entry
https://docs.python.org/3.3/whatsnew/changelog.html Vendor Advisory
http://seclists.org/oss-sec/2014/q1/592 Mailing List Third Party Advisory
http://seclists.org/oss-sec/2014/q1/595 Mailing List Third Party Advisory
http://hg.python.org/cpython/rev/79ea4ce431b1 Exploit Patch Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html Mailing List
https://support.apple.com/kb/HT205031 Patch Vendor Advisory
http://www.securityfocus.com/bid/65179 Third Party Advisory VDB Entry
https://security.gentoo.org/glsa/201503-10 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:38:04 Added to TrackCVE
2022-12-01 22:48:41 2014-04-22T14:23Z 2014-04-22T14:23:34 CVE Published Date updated
2022-12-01 22:48:41 2019-08-21T12:41:11 CVE Modified Date updated
2022-12-01 22:48:41 Analyzed Vulnerability Status updated