pysec-2022-160
Vulnerability from pysec
Published
2022-03-03 21:15
Modified
2022-03-10 17:35
Details
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as nc -rv localhost 22 < /dev/zero
. A patch is available in version 22.2.0. There are currently no known workarounds.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "twisted", "purl": "pkg:pypi/twisted" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "89c395ee794e85a9657b112c4351417850330ef9" } ], "repo": "https://github.com/twisted/twisted", "type": "GIT" }, { "events": [ { "introduced": "21.7.0" }, { "fixed": "22.2.0" } ], "type": "ECOSYSTEM" } ], "versions": [ "21.7.0", "22.1.0", "22.1.0rc1", "22.2.0rc1" ] } ], "aliases": [ "CVE-2022-21716", "GHSA-rv6r-3f5q-9rgx" ], "details": "Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer\u0027s SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 \u003c /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.", "id": "PYSEC-2022-160", "modified": "2022-03-10T17:35:00.079970Z", "published": "2022-03-03T21:15:00Z", "references": [ { "type": "FIX", "url": "https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9" }, { "type": "ADVISORY", "url": "https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx" }, { "type": "WEB", "url": "https://twistedmatrix.com/trac/ticket/10284" }, { "type": "WEB", "url": "https://github.com/twisted/twisted/releases/tag/twisted-22.2.0" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.