Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2021-01-19 06:15
Updated : 2023-11-07 03:37
NVD link : CVE-2021-3177
Mitre link : CVE-2021-3177
CVE.ORG link : CVE-2021-3177
JSON object : View
Products Affected
oracle
- enterprise_manager_ops_center
- communications_offline_mediation_controller
- communications_cloud_native_core_network_function_cloud_native_environment
- zfs_storage_appliance_kit
- communications_pricing_design_center
python
- python
fedoraproject
- fedora
netapp
- active_iq_unified_manager
- ontap_select_deploy_administration_utility
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')