Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6444

Опубликовано: 05 мая 2014
Источник: debian
EPSS Низкий

Описание

PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pywbemfixed0.8.0~dev650-1package
pywbemno-dsasqueezepackage
pywbemno-dsawheezypackage

Примечания

  • Fix: https://bugzilla.redhat.com/attachment.cgi?id=851357

EPSS

Процентиль: 51%
0.00285
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

redhat
около 12 лет назад

PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

nvd
почти 12 лет назад

PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

github
больше 3 лет назад

PyWBEM TOCTOU vulnerability in certificate validation

EPSS

Процентиль: 51%
0.00285
Низкий