John Leitch added the comment:

Yes, this is a user-mode read, but I disagree with the assertion that it's not 
possible to use this to disclose memory. While it isn't as critical as 
something that outright dumps memory, there is logic that throws exceptions 
based on values encountered while reading outside the bounds of the buffer. 
This could be used as a channel to infer what is or isn't in adjacent memory. 
That it's user-mode doesn't matter--if an application exposes the format string 
as attack surface, suddenly process memory can be probed. So, it's not 
heartbleed, but it does have security implications. If you'd like, I can take a 
shot at building a PoC.

Further, it's best to err on the side of caution with bugs like these; just 
because it doesn't seem like major issue now doesn't mean someone won't come 
along in the future and prove otherwise.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue24917>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to