Описание
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
python2.7 | fixed | 2.7.5-5 | package | |
python2.7 | not-affected | wheezy | package | |
linkchecker | fixed | 8.5-1 | package | |
linkchecker | no-dsa | wheezy | package | |
linkchecker | no-dsa | squeeze | package | |
python3.2 | removed | package | ||
python3.2 | no-dsa | wheezy | package | |
python3.3 | fixed | 3.3.2-3 | package | |
python2.6 | not-affected | package | ||
python2.5 | not-affected | package | ||
python3.1 | not-affected | package | ||
bzr | fixed | 2.6.0~bzr6574-1 | package | |
bzr | no-dsa | squeeze | package | |
python-urllib3 | fixed | 1.6-2 | package | |
python-urllib3 | no-dsa | wheezy | package | |
python-tornado | fixed | 2.4.1-3 | package | |
python-tornado | no-dsa | wheezy | package | |
python-tornado | no-dsa | squeeze | package | |
w3af | unfixed | package | ||
w3af | no-dsa | jessie | package | |
w3af | no-dsa | wheezy | package | |
w3af | no-dsa | squeeze | package | |
u1db | fixed | 13.10-1 | package |
Связанные уязвимости
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.