CVE-2016-9015
https://notcve.org/view.php?id=CVE-2016-9015
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low. Versiones 1.17 y 1.18 de la librería de Python urllib3 sufren una vulnerabilidad que puede provocarles, en ciertas configuraciones, que no validen correctamente certificados TLS. • http://www.openwall.com/lists/oss-security/2016/10/27/6 http://www.securityfocus.com/bid/93941 • CWE-295: Improper Certificate Validation •
CVE-2016-6580
https://notcve.org/view.php?id=CVE-2016-6580
A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree. Una implementación HTTP/2 construida usando cualquier versión de la librería de prioridad de Python anterior a la versión 1.2.0 podría ser atacado por un par malicioso teniendo ese par información de prioridad de asignación para cada posible ID de secuencia HTTP/2. El árbol de prioridad continuaría felizmente almacenando la información de prioridad para cada secuencia, y por tanto asignaría cantidades ilimitadas de memoria. • http://www.securityfocus.com/bid/92311 https://python-hyper.org/priority/en/latest/security/CVE-2016-6580.html • CWE-399: Resource Management Errors •
CVE-2016-6581
https://notcve.org/view.php?id=CVE-2016-6581
A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called "HPACK Bomb" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine. Una implementación de HTTP/2 construida usando cualquier versión de la librería de Python HPACK entre las versiones v1.0.0 y v2.2.0 podría ser atacada por un ataque de denegación de servicio, especialmente un ataque llamado "HPACK Bomb". • http://www.securityfocus.com/bid/92315 https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html • CWE-399: Resource Management Errors •
CVE-2016-5851
https://notcve.org/view.php?id=CVE-2016-5851
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document. python-docx en versiones anteriores a 0.8.6 permite a atacantes dependientes del contexto llevar a cabo ataques de XXE a través de un documento manipulado. • http://www.openwall.com/lists/oss-security/2016/06/28/7 http://www.openwall.com/lists/oss-security/2016/06/28/8 http://www.securityfocus.com/bid/91485 https://github.com/python-openxml/python-docx/blob/v0.8.6/HISTORY.rst https://github.com/python-openxml/python-docx/commit/61b40b161b64173ab8e362aec1fd197948431beb https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FFMOH7ZPOPQWNJGUZOS5LXX4MGNRXXT https://lists.fedoraproject.org/archives/list/package-announce%40lists • CWE-611: Improper Restriction of XML External Entity Reference •
CVE-2016-9063
https://notcve.org/view.php?id=CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. Desbordamiento de enteros durante el análisis de XML mediante la biblioteca Expat. La vulnerabilidad afecta a Firefox en versiones anteriores a la 50. • http://www.securityfocus.com/bid/94337 http://www.securitytracker.com/id/1037298 http://www.securitytracker.com/id/1039427 https://bugzilla.mozilla.org/show_bug.cgi?id=1274777 https://www.debian.org/security/2017/dsa-3898 https://www.mozilla.org/security/advisories/mfsa2016-89 • CWE-190: Integer Overflow or Wraparound •