Vulnerability Details : CVE-2015-0221
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
Vulnerability category: Denial of service
Products affected by CVE-2015-0221
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-0221
10.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-0221
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-0221
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-0221
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
[SECURITY] Fedora 20 Update: python-django14-1.4.18-1.fc20
-
http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
openSUSE-SU-2015:0643-1: moderate: Security update for python-Django
-
http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
openSUSE-SU-2015:1598-1: moderate: Security update for python-django
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
[SECURITY] Fedora 21 Update: python-django-1.6.10-1.fc21
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:036
mandriva.com
-
https://www.djangoproject.com/weblog/2015/jan/13/security/
Security releases issued | Weblog | DjangoExploit;Patch;Vendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
[SECURITY] Fedora 20 Update: python-django-1.6.10-1.fc20
-
http://ubuntu.com/usn/usn-2469-1
USN-2469-1: Django vulnerabilities | Ubuntu security noticesPatch;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
mandriva.com
-
http://advisories.mageia.org/MGASA-2015-0026.html
Mageia Advisory: MGASA-2015-0026 - Updated python-django and python-django14 packages fix security vulnerabilities
Jump to