Skip to content

typed-ast Out-of-bounds Read

High severity GitHub Reviewed Published Dec 2, 2019 to the GitHub Advisory Database • Updated Sep 5, 2023

Package

pip typed-ast (pip)

Affected versions

>= 1.3.0, <= 1.3.1

Patched versions

1.4.0

Description

typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)

References

Reviewed Nov 27, 2019
Published to the GitHub Advisory Database Dec 2, 2019
Last updated Sep 5, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2019-19275

GHSA ID

GHSA-7xxv-wpxj-mx5v

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.