Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4238

Опубликовано: 18 авг. 2013
Источник: debian

Описание

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python2.5removedpackage
python2.5no-dsasqueezepackage
python2.6removedpackage
python2.6no-dsawheezypackage
python2.7fixed2.7.5-8package
python3.1removedpackage
python3.1no-dsasqueezepackage
python3.2removedpackage
python3.2no-dsawheezypackage
python3.3fixed3.3.2-6package

Примечания

  • http://bugs.python.org/issue18709

  • https://bugs.mageia.org/show_bug.cgi?id=10989

Связанные уязвимости

ubuntu
почти 12 лет назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

redhat
почти 12 лет назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

nvd
почти 12 лет назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

github
около 3 лет назад

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

oracle-oval
больше 11 лет назад

ELSA-2013-1582: python security, bug fix, and enhancement update (MODERATE)