Описание
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип | 
|---|---|---|---|---|
| python2.7 | fixed | 2.7.5-5 | package | |
| python2.7 | not-affected | wheezy | package | |
| linkchecker | fixed | 8.5-1 | package | |
| linkchecker | no-dsa | wheezy | package | |
| linkchecker | no-dsa | squeeze | package | |
| python3.2 | removed | package | ||
| python3.2 | no-dsa | wheezy | package | |
| python3.3 | fixed | 3.3.2-3 | package | |
| python2.6 | not-affected | package | ||
| python2.5 | not-affected | package | ||
| python3.1 | not-affected | package | ||
| bzr | fixed | 2.6.0~bzr6574-1 | package | |
| bzr | no-dsa | squeeze | package | |
| python-urllib3 | fixed | 1.6-2 | package | |
| python-urllib3 | no-dsa | wheezy | package | |
| python-tornado | fixed | 2.4.1-3 | package | |
| python-tornado | no-dsa | wheezy | package | |
| python-tornado | no-dsa | squeeze | package | |
| w3af | unfixed | package | ||
| w3af | no-dsa | jessie | package | |
| w3af | no-dsa | wheezy | package | |
| w3af | no-dsa | squeeze | package | |
| u1db | fixed | 13.10-1 | package | 
Связанные уязвимости
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.