Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-2099

Опубликовано: 15 мая 2013
Источник: redhat
CVSS2: 2.6
EPSS Низкий

Описание

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

A denial of service flaw was found in the way Python's SSL module implementation performed matching of certain certificate names. A remote attacker able to obtain a valid certificate that contained multiple wildcard characters could use this flaw to issue a request to validate such a certificate, resulting in excessive consumption of CPU.

Отчет

This issue did not affect the versions of python as shipped with Red Hat Enterprise Linux 5 and 6 as the SSL module there did not implement the match_hostname() routine yet.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5pythonNot affected
Red Hat Enterprise Linux 6bzrNot affected
Red Hat Enterprise Linux 6pythonNot affected
Red Hat Enterprise Linux 7bzrWill not fix
Red Hat Enterprise Linux 7pythonNot affected
Red Hat Enterprise Linux 7python-tornadoNot affected
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)python-backports-ssl_match_hostnameNot affected
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)python-pymongoAffected
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)python-pymongoAffected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)python-pymongoAffected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-407
https://bugzilla.redhat.com/show_bug.cgi?id=963260python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns

EPSS

Процентиль: 89%
0.04478
Низкий

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

nvd
больше 11 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

debian
больше 11 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname functio ...

github
около 3 лет назад

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

EPSS

Процентиль: 89%
0.04478
Низкий

2.6 Low

CVSS2

Уязвимость CVE-2013-2099