CVE-2010-3493
Python: SMTP proxy RFC 2821 module DoS (uncaught exception) (Issue #9129)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
Múltiples condiciones de carrera en smtpd.py en el módulo smtpd in Python v2.6, v2.7, v3.1 y v3.2 alpha permite a atacantes remotos provocar una denegación de servicio (agotamiento de demonio)por establecimiento e inmediatamente cerrando una conexión TCP, llevando la función accept a devolver un valor inesperado de None, un valor inesperado de None para la dirección, o un error ECONNABORTED, EAGAIN, o EWOULDBLOCK, o la función getpeername teniendo un error ENOTCONN, tema relacionado con CVE-2010-3492.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-09-24 CVE Reserved
- 2010-10-19 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (25)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/43068 | Third Party Advisory | |
http://secunia.com/advisories/50858 | Third Party Advisory | |
http://secunia.com/advisories/51024 | Third Party Advisory | |
http://secunia.com/advisories/51040 | Third Party Advisory | |
http://svn.python.org/view?view=rev&revision=84289 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2010/09/09/6 | Mailing List | |
http://www.openwall.com/lists/oss-security/2010/09/11/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2010/09/22/3 | Mailing List | |
http://www.openwall.com/lists/oss-security/2010/09/24/3 | Mailing List | |
http://www.securityfocus.com/bid/44533 | Vdb Entry | |
http://www.vupen.com/english/advisories/2011/0212 | Vdb Entry | |
https://bugs.launchpad.net/zodb/+bug/135108 | X_refsource_misc | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12210 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://bugs.python.org/issue6706 | 2019-10-25 | |
http://bugs.python.org/issue9129 | 2019-10-25 | |
http://svn.python.org/view/python/branches/py3k/Lib/smtpd.py?r1=84289&r2=84288&pathrev=84289 | 2019-10-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Python Search vendor "Python" | Python Search vendor "Python" for product "Python" | 3.1 Search vendor "Python" for product "Python" and version "3.1" | - |
Affected
| ||||||
Python Search vendor "Python" | Python Search vendor "Python" for product "Python" | 3.2 Search vendor "Python" for product "Python" and version "3.2" | alpha |
Affected
|