PyPi: Typed-Ast

CVE-2019-19275

Safety vulnerability ID: 37768

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Nov 26, 2019 Updated at Dec 10, 2024
Scan your Python projects for vulnerabilities →

Advisory

Typed_ast 1.3.0 and 1.3.1 have an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.) See: CVE-2019-19275.

Affected package

typed-ast

Latest version: 1.5.5

a fork of Python 2 and 3 ast modules with type comment support

Affected versions

Fixed versions

Vulnerability changelog

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)


MISC:https://bugs.python.org/issue36495: https://bugs.python.org/issue36495
MISC:https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e: https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e
MISC:https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c: https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
MISC:https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce: https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce
MISC:https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b: https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH

CVSS v2 Details

MEDIUM 5.0
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Impact (A)
PARTIAL