// For flags

CVE-2014-2667

Gentoo Linux Security Advisory 201503-10

Severity Score

7.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.

Condición de carrera en la función _get_masked_mode en Lib/os.py en Python 3.2 hasta 3.5, cuando exist_ok está activado y se utilizan múltiples hilos, podría permitir a usuarios locales saltarse el archivo destinado a los permisos aprovechando una vulnerabilidad de solicitud por separado antes de que umask haya sido ajustado al valor esperado.

Updated python3 packages fix security vulnerabilities. ZipExtFile.read goes into 100% CPU infinite loop on maliciously binary edited zips. A vulnerability was reported in Python's socket module, due to a boundary error within the sock_recvfrom_into() function, which could be exploited to cause a buffer overflow. This could be used to crash a Python application that uses the socket.recvfrom_info() function or, possibly, execute arbitrary code with the permissions of the user running vulnerable Python code. It was reported that a patch added to Python 3.2 caused a race condition where a file created could be created with world read/write permissions instead of the permissions dictated by the original umask of the process. This could allow a local attacker that could win the race to view and edit files created by a program using this call. Note that prior versions of Python, including 2.x, do not include the vulnerable _get_masked_mode() function that is used by os.makedirs() when exist_ok is set to True. Python are susceptible to arbitrary process memory reading by a user or adversary due to a bug in the _json module caused by insufficient bounds checking. The bug is caused by allowing the user to supply a negative value that is used an an array index, causing the scanstring function to access process memory outside of the string it is intended to access. The CGIHTTPServer Python module does not properly handle URL-encoded path separators in URLs. This may enable attackers to disclose a CGI script's source code or execute arbitrary scripts in the server's document root.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-03-26 CVE Reserved
  • 2014-11-16 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.0
Search vendor "Python" for product "Python" and version "3.2.0"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.1
Search vendor "Python" for product "Python" and version "3.2.1"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.2
Search vendor "Python" for product "Python" and version "3.2.2"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.3
Search vendor "Python" for product "Python" and version "3.2.3"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.4
Search vendor "Python" for product "Python" and version "3.2.4"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.5
Search vendor "Python" for product "Python" and version "3.2.5"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.6
Search vendor "Python" for product "Python" and version "3.2.6"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.0
Search vendor "Python" for product "Python" and version "3.3.0"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.1
Search vendor "Python" for product "Python" and version "3.3.1"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.2
Search vendor "Python" for product "Python" and version "3.3.2"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.3
Search vendor "Python" for product "Python" and version "3.3.3"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.4
Search vendor "Python" for product "Python" and version "3.3.4"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.5
Search vendor "Python" for product "Python" and version "3.3.5"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.6
Search vendor "Python" for product "Python" and version "3.3.6"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.4.0
Search vendor "Python" for product "Python" and version "3.4.0"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.4.1
Search vendor "Python" for product "Python" and version "3.4.1"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.4.2
Search vendor "Python" for product "Python" and version "3.4.2"
-
Affected