Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
Link | Tags |
---|---|
https://hackerone.com/reports/12297 | exploit third party advisory patch |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752395 | issue tracking mailing list third party advisory |
http://rhn.redhat.com/errata/RHSA-2015-1064.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/68119 | vdb entry third party advisory |
http://lists.opensuse.org/opensuse-updates/2014-07/msg00015.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/201503-10 | vdb entry third party advisory patch vendor advisory |
http://openwall.com/lists/oss-security/2014/06/24/7 | third party advisory mailing list |
http://bugs.python.org/issue21529 | issue tracking vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1112285 | issue tracking third party advisory patch |