Описание
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
Отчет
Not vulnerable. This issue did not affect the versions of pyOpenSSL as shipped with Red Hat Enterprise Linux 5 and 6.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | pyOpenSSL | Not affected | ||
| Red Hat Enterprise Linux 6 | pyOpenSSL | Not affected | ||
| Red Hat Enterprise Linux 7 | pyOpenSSL | Not affected | ||
| Red Hat OpenStack Platform 4 | pyOpenSSL | Not affected | ||
| Red Hat Storage 2.1 | pyOpenSSL | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle ...
PyOpenSSL Mishandles NUL Byte In Certificate Subject Alternative Name
EPSS
4.3 Medium
CVSS2