Search for vulnerabilities
Vulnerability details: VCID-c7j4-3vmk-aaaf
Vulnerability ID VCID-c7j4-3vmk-aaaf
Aliases CVE-2024-5642
Summary python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used
Status Published
Exploitability 0.5
Weighted Severity 5.9
Risk 3.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 2.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5642.json
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00414 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00486 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
epss 0.01684 https://api.first.org/data/v1/epss?cve=CVE-2024-5642
cvssv3.1 4.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.5 https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
ssvc Track https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
cvssv3.1 6.5 https://github.com/python/cpython/issues/121227
ssvc Track https://github.com/python/cpython/issues/121227
cvssv3.1 6.5 https://github.com/python/cpython/pull/23014
ssvc Track https://github.com/python/cpython/pull/23014
cvssv3.1 6.5 https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
ssvc Track https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
cvssv3.1 6.5 https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
ssvc Track https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
cvssv3.1 6.5 https://security.netapp.com/advisory/ntap-20240726-0005/
ssvc Track https://security.netapp.com/advisory/ntap-20240726-0005/
cvssv3.1 6.5 http://www.openwall.com/lists/oss-security/2024/06/28/4
ssvc Track http://www.openwall.com/lists/oss-security/2024/06/28/4
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5642.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://github.com/python/cpython/commit/39258d3595300bc7b952854c915f63ae2d4b9c3e
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://github.com/python/cpython/issues/121227
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://github.com/python/cpython/issues/121227
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://github.com/python/cpython/pull/23014
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://github.com/python/cpython/pull/23014
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://mail.python.org/archives/list/security-announce@python.org/thread/PLP2JI3PJY33YG6P5BZYSSNU66HASXBQ/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at https://security.netapp.com/advisory/ntap-20240726-0005/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at https://security.netapp.com/advisory/ntap-20240726-0005/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L Found at http://www.openwall.com/lists/oss-security/2024/06/28/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-28T13:47:34Z/ Found at http://www.openwall.com/lists/oss-security/2024/06/28/4
Exploit Prediction Scoring System (EPSS)
Percentile 0.11214
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-06-28T07:01:19.568704+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5642.json 34.0.0rc4