Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
24 May 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* |
cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* |
References |
|
|
References | (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
25 Jul 2022, 18:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Mar 2022, 16:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:* cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
14 Feb 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Feb 2022, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Oct 2021, 11:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-01-19 06:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-3177
Mitre link : CVE-2021-3177
CVE.ORG link : CVE-2021-3177
JSON object : View
Products Affected
debian
- debian_linux
oracle
- communications_pricing_design_center
- enterprise_manager_ops_center
- communications_offline_mediation_controller
- zfs_storage_appliance_kit
- communications_cloud_native_core_network_function_cloud_native_environment
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
fedoraproject
- fedora
python
- python
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')