ALAS-2016-724

Related Vulnerabilities: CVE-2016-0772   CVE-2016-5636   CVE-2016-5699  

It was found that Python's httplib library (used urllib, urllib2 and others) did not properly check HTTP header input in HTTPConnection.putheader(). An attacker could use this flow to inject additional headers in a Python application that allows user provided header name or values. (CVE-2016-5699) It was found that Python's smtplib library did not return an exception if StartTLS fails to establish correctly in the SMTP.starttls() function. An attacker with ability to launch an active man in the middle attack could strip out the STARTTLS command without generating an exception on the python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) A vulnerability was discovered in Python, in the built-in zipimporter. A specially crafted zip file placed in a module path such that it would be loaded by a later "import" statement could cause a heap overflow, leading to arbitrary code execution. (CVE-2016-5636)

ALAS-2016-724


Amazon Linux AMI Security Advisory: ALAS-2016-724
Advisory Release Date: 2016-07-20 18:00 Pacific
Advisory Updated Date: 2016-07-20 18:00 Pacific
Severity: Medium

Issue Overview:

It was found that Python's httplib library (used urllib, urllib2 and others) did not properly check HTTP header input in HTTPConnection.putheader(). An attacker could use this flow to inject additional headers in a Python application that allows user provided header name or values. (CVE-2016-5699)

It was found that Python's smtplib library did not return an exception if StartTLS fails to establish correctly in the SMTP.starttls() function. An attacker with ability to launch an active man in the middle attack could strip out the STARTTLS command without generating an exception on the python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772)

A vulnerability was discovered in Python, in the built-in zipimporter. A specially crafted zip file placed in a module path such that it would be loaded by a later "import" statement could cause a heap overflow, leading to arbitrary code execution. (CVE-2016-5636)


Affected Packages:

python26, python27, python34


Issue Correction:
Run yum update python26 to update your system.
Run yum update python27 to update your system.
Run yum update python34 to update your system.

New Packages:
i686:
    python26-libs-2.6.9-2.86.amzn1.i686
    python26-tools-2.6.9-2.86.amzn1.i686
    python26-test-2.6.9-2.86.amzn1.i686
    python26-2.6.9-2.86.amzn1.i686
    python26-debuginfo-2.6.9-2.86.amzn1.i686
    python26-devel-2.6.9-2.86.amzn1.i686
    python27-devel-2.7.10-4.122.amzn1.i686
    python27-test-2.7.10-4.122.amzn1.i686
    python27-tools-2.7.10-4.122.amzn1.i686
    python27-debuginfo-2.7.10-4.122.amzn1.i686
    python27-2.7.10-4.122.amzn1.i686
    python27-libs-2.7.10-4.122.amzn1.i686
    python34-tools-3.4.3-1.32.amzn1.i686
    python34-test-3.4.3-1.32.amzn1.i686
    python34-3.4.3-1.32.amzn1.i686
    python34-devel-3.4.3-1.32.amzn1.i686
    python34-debuginfo-3.4.3-1.32.amzn1.i686
    python34-libs-3.4.3-1.32.amzn1.i686

src:
    python26-2.6.9-2.86.amzn1.src
    python27-2.7.10-4.122.amzn1.src
    python34-3.4.3-1.32.amzn1.src

x86_64:
    python26-libs-2.6.9-2.86.amzn1.x86_64
    python26-tools-2.6.9-2.86.amzn1.x86_64
    python26-test-2.6.9-2.86.amzn1.x86_64
    python26-devel-2.6.9-2.86.amzn1.x86_64
    python26-2.6.9-2.86.amzn1.x86_64
    python26-debuginfo-2.6.9-2.86.amzn1.x86_64
    python27-devel-2.7.10-4.122.amzn1.x86_64
    python27-test-2.7.10-4.122.amzn1.x86_64
    python27-tools-2.7.10-4.122.amzn1.x86_64
    python27-2.7.10-4.122.amzn1.x86_64
    python27-debuginfo-2.7.10-4.122.amzn1.x86_64
    python27-libs-2.7.10-4.122.amzn1.x86_64
    python34-3.4.3-1.32.amzn1.x86_64
    python34-debuginfo-3.4.3-1.32.amzn1.x86_64
    python34-devel-3.4.3-1.32.amzn1.x86_64
    python34-tools-3.4.3-1.32.amzn1.x86_64
    python34-test-3.4.3-1.32.amzn1.x86_64
    python34-libs-3.4.3-1.32.amzn1.x86_64