|Related CVE||CVE-2013-1753 CVE-2014-4616 CVE-2014-4650 CVE-2014-7185 CVE-2019-16056|
Vulnerabilities have been discovered in Python, an interactive high-level object-oriented language.
The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied.
A denial of service (resource exhaustion, excessive memory consumption) can be triggered in the xmlrpc library by a specially crafted HTTP request.
An attacker is able to read arbitrary process memory by a specially crafted JSON string.
Information disclosure or arbirtary code execution is possible via a specially crafted URL because of improper handling of URL-encoded path separators in the CGIHTTPServer module.
A context-dependent attacker can take advantage of an integer overflow to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
For Debian 7 Wheezy, these problems have been fixed in version 2.7.3-6+deb7u8.
We recommend that you upgrade your python2.7 packages.
Further information about Extended LTS security advisories can be found at: https://deb.freexian.com/extended-lts/