Vulnerability Description
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
CVSS Score
9.8
CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jython Project | Jython | 2.7.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://bugs.jython.org/issue2454Vendor Advisory
- http://www.debian.org/security/2017/dsa-3893Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/105647
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859Mailing ListThird Party Advisory
- https://hg.python.org/jython/file/v2.7.1rc1/NEWSThird Party Advisory
- https://hg.python.org/jython/rev/d06e29d100c0PatchThird Party Advisory
- https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b46
- https://security-tracker.debian.org/tracker/CVE-2016-4000Third Party Advisory
- https://security.gentoo.org/glsa/201710-28
- https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451Third Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
FAQ
What is CVE-2016-4000?
CVE-2016-4000 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
How severe is CVE-2016-4000?
CVE-2016-4000 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-4000?
Check the references section above for vendor advisories and patch information. Affected products include: Jython Project Jython, Debian Debian Linux.