summaryrefslogtreecommitdiff
path: root/Lib/poplib.py
diff options
context:
space:
mode:
authorMiss Islington (bot) <31488909+miss-islington@users.noreply.github.com>2018-03-03 21:55:07 -0800
committerBenjamin Peterson <benjamin@python.org>2018-03-03 21:55:07 -0800
commit0902a2d6b2d1d9dbde36aeaaccf1788ceaa97143 (patch)
tree1b3a032baf882f64170136b71632b211d430714c /Lib/poplib.py
parent0f7cf7eb8a2c9a1766780ebf225a2f4c0640788e (diff)
downloadcpython-git-0902a2d6b2d1d9dbde36aeaaccf1788ceaa97143.tar.gz
bpo-32981: Fix catastrophic backtracking vulns (GH-5955)
* Prevent low-grade poplib REDOS (CVE-2018-1060) The regex to test a mail server's timestamp is susceptible to catastrophic backtracking on long evil responses from the server. Happily, the maximum length of malicious inputs is 2K thanks to a limit introduced in the fix for CVE-2013-1752. A 2KB evil response from the mail server would result in small slowdowns (milliseconds vs. microseconds) accumulated over many apop calls. This is a potential DOS vector via accumulated slowdowns. Replace it with a similar non-vulnerable regex. The new regex is RFC compliant. The old regex was non-compliant in edge cases. * Prevent difflib REDOS (CVE-2018-1061) The default regex for IS_LINE_JUNK is susceptible to catastrophic backtracking. This is a potential DOS vector. Replace it with an equivalent non-vulnerable regex. Also introduce unit and REDOS tests for difflib. Co-authored-by: Tim Peters <tim.peters@gmail.com> Co-authored-by: Christian Heimes <christian@python.org> Co-authored-by: Jamie Davis <davisjam@vt.edu> (cherry picked from commit 0e6c8ee2358a2e23117501826c008842acb835ac)
Diffstat (limited to 'Lib/poplib.py')
-rw-r--r--Lib/poplib.py2
1 files changed, 1 insertions, 1 deletions
diff --git a/Lib/poplib.py b/Lib/poplib.py
index 6bcfa5cfeb..d8a62c0343 100644
--- a/Lib/poplib.py
+++ b/Lib/poplib.py
@@ -308,7 +308,7 @@ class POP3:
return self._shortcmd('RPOP %s' % user)
- timestamp = re.compile(br'\+OK.*(<[^>]+>)')
+ timestamp = re.compile(br'\+OK.[^<]*(<.*>)')
def apop(self, user, password):
"""Authorisation