Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-01-19 06:15
Updated : 2022-07-25 18:16
NVD link : CVE-2021-3177
Mitre link : CVE-2021-3177
JSON object : View
Products Affected
debian
- debian_linux
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
python
- python
fedoraproject
- fedora
oracle
- communications_pricing_design_center
- communications_offline_mediation_controller
- enterprise_manager_ops_center
- zfs_storage_appliance_kit
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
