Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-7040 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the version of python as shipped with Red Hat Enterprise Linux 5 and 6. There are currently no plans to fix this issue. For more details please refer to https://bugzilla.redhat.com/show_bug.cgi?id=1039915#c4
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 5 |
---|---|
Base Metrics | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Software Collections 1 for Red Hat Enterprise Linux | python33-python | Will not fix |
Red Hat Software Collections 1 for Red Hat Enterprise Linux | python27-python | Will not fix |
Red Hat Enterprise Linux 7 | python | Will not fix |
Red Hat Enterprise Linux 6 | python | Will not fix |
Red Hat Enterprise Linux 5 | python | Will not fix |