Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-2099

Опубликовано: 09 окт. 2013
Источник: debian

Описание

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python2.7fixed2.7.5-5package
python2.7not-affectedwheezypackage
linkcheckerfixed8.5-1package
linkcheckerno-dsawheezypackage
linkcheckerno-dsasqueezepackage
python3.2removedpackage
python3.2no-dsawheezypackage
python3.3fixed3.3.2-3package
python2.6not-affectedpackage
python2.5not-affectedpackage
python3.1not-affectedpackage
bzrfixed2.6.0~bzr6574-1package
bzrno-dsasqueezepackage
python-urllib3fixed1.6-2package
python-urllib3no-dsawheezypackage
python-tornadofixed2.4.1-3package
python-tornadono-dsawheezypackage
python-tornadono-dsasqueezepackage
w3afunfixedpackage
w3afno-dsajessiepackage
w3afno-dsawheezypackage
w3afno-dsasqueezepackage
u1dbfixed13.10-1package

Связанные уязвимости

ubuntu
больше 11 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

redhat
около 12 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

nvd
больше 11 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

github
около 3 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.