CVE-2015-0221
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
16/01/2015
Last modified:
12/04/2025
Description
The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* | 1.4.17 (including) | |
cpe:2.3:a:djangoproject:django:1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.6.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:djangoproject:django:1.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:lts:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://secunia.com/advisories/62285
- http://secunia.com/advisories/62309
- http://secunia.com/advisories/62718
- http://ubuntu.com/usn/usn-2469-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A109
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- http://secunia.com/advisories/62285
- http://secunia.com/advisories/62309
- http://secunia.com/advisories/62718
- http://ubuntu.com/usn/usn-2469-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A036
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A109
- https://www.djangoproject.com/weblog/2015/jan/13/security/