Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-01-18 22:15
Updated : 2022-12-06 13:52
NVD link : CVE-2021-3177
Mitre link : CVE-2021-3177
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
oracle
- communications_pricing_design_center
- communications_cloud_native_core_network_function_cloud_native_environment
- communications_offline_mediation_controller
- zfs_storage_appliance_kit
- enterprise_manager_ops_center
python
- python
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
fedoraproject
- fedora
debian
- debian_linux