Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106539
Category:Web application abuses
Title:Splunk Enterprise Python Vulnerabilities (SP-CAAAPSR)
Summary:Splunk Enterprise is prone to multiple vulnerabilities in; Python.
Description:Summary:
Splunk Enterprise is prone to multiple vulnerabilities in
Python.

Vulnerability Insight:
The following vulnerabilities exist:

- CVE-2016-5636: Integer overflow in the get_data function in zipimport.c in Python allows remote
attackers to have unspecified impact via a negative data size value, which triggers a heap-based
buffer overflow.

- CVE-2016-5699: CRLF injection in the HTTPConnection.putheader function in urllib2 and urllib in
Python allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.

- CVE-2016-0772: The smtplib library in Python does not return an error when StartTLS fails,
which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a
network position between the client and the registry to block the StartTLS command, aka a
'StartTLS stripping attack'.

Affected Software/OS:
Splunk Enterprise 5.0.x, 6.0.x, 6.1.x, 6.2.x, 6.3.x, 6.4.x and
6.5.0.

Solution:
Update to version 5.0.17, 6.0.13, 6.1.12, 6.2.12, 6.3.8,
6.4.5, 6.5.1 or later.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-5636
BugTraq ID: 91247
http://www.securityfocus.com/bid/91247
https://security.gentoo.org/glsa/201701-18
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
http://www.openwall.com/lists/oss-security/2016/06/15/15
http://www.openwall.com/lists/oss-security/2016/06/16/1
RedHat Security Advisories: RHSA-2016:2586
http://rhn.redhat.com/errata/RHSA-2016-2586.html
http://www.securitytracker.com/id/1038138
SuSE Security Announcement: openSUSE-SU-2020:0086 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-5699
91226
http://www.securityfocus.com/bid/91226
RHSA-2016:1626
http://rhn.redhat.com/errata/RHSA-2016-1626.html
RHSA-2016:1627
http://rhn.redhat.com/errata/RHSA-2016-1627.html
RHSA-2016:1628
http://rhn.redhat.com/errata/RHSA-2016-1628.html
RHSA-2016:1629
http://rhn.redhat.com/errata/RHSA-2016-1629.html
RHSA-2016:1630
http://rhn.redhat.com/errata/RHSA-2016-1630.html
[debian-lts-announce] 20190207 [SECURITY] [DLA 1663-1] python3.4 security update
[oss-security] 20160614 CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/14/7
[oss-security] 20160615 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/15/12
[oss-security] 20160616 Re: CVE request: Python HTTP header injection in urrlib2/urllib/httplib/http.client
http://www.openwall.com/lists/oss-security/2016/06/16/2
http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-4
https://hg.python.org/cpython/raw-file/v2.7.10/Misc/NEWS
https://hg.python.org/cpython/rev/1c45047c5102
https://hg.python.org/cpython/rev/bf3e1c9b80e9
openSUSE-SU-2020:0086
Common Vulnerability Exposure (CVE) ID: CVE-2016-0772
91225
http://www.securityfocus.com/bid/91225
GLSA-201701-18
[oss-security] 20160614 Python CVE-2016-0772: smtplib StartTLS stripping attack
http://www.openwall.com/lists/oss-security/2016/06/14/9
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
https://hg.python.org/cpython/rev/b3ce713fb9be
https://hg.python.org/cpython/rev/d590114c2394
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.