CVE-2014-4616

CVE Details

Release Date:2014-05-19
Impact:Moderate What is this?

Description


Array index error in the scanstring function in the _json module inPython 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.

See more information about CVE-2014-4616 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 4.0
Vector String: AV:N/AC:H/Au:N/C:P/I:N/A:P
Version: 2.0
Attack Vector: Network
Attack Complexity: High
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: None
Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (python27)ELSA-2015-10642016-02-04
Oracle Linux version 6 (python27-python)ELSA-2015-10642016-02-04
Oracle Linux version 6 (python27-python-pip)ELSA-2015-10642016-02-04
Oracle Linux version 6 (python27-python-setuptools)ELSA-2015-10642016-02-04
Oracle Linux version 6 (python27-python-simplejson)ELSA-2015-10642016-02-04
Oracle Linux version 6 (python27-python-wheel)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python)ELSA-2015-21012015-11-23
Oracle Linux version 7 (python27)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python27-python)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python27-python-pip)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python27-python-setuptools)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python27-python-simplejson)ELSA-2015-10642016-02-04
Oracle Linux version 7 (python27-python-wheel)ELSA-2015-10642016-02-04


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete