HIGH · 7.5

CVE-2019-20907

In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.

Vulnerability Description

In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
PythonPython>= 3.5.0, < 3.5.10
OpensuseLeap15.1
DebianDebian Linux9.0
FedoraprojectFedora31
CanonicalUbuntu Linux12.04
NetappActive Iq Unified Manager>= 9.5
NetappCloud Volumes Ontap Mediator-
OracleZfs Storage Appliance Kit8.8

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-20907?

CVE-2019-20907 is a vulnerability with a CVSS score of 7.5 (HIGH). In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.

How severe is CVE-2019-20907?

CVE-2019-20907 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-20907?

Check the references section above for vendor advisories and patch information. Affected products include: Python Python, Opensuse Leap, Debian Debian Linux, Fedoraproject Fedora, Canonical Ubuntu Linux.