Π›ΠΎΠ³ΠΎΡ‚ΠΈΠΏ exploitDog
Консоль
Π›ΠΎΠ³ΠΎΡ‚ΠΈΠΏ exploitDog

exploitDog

ubuntu Π»ΠΎΠ³ΠΎΡ‚ΠΈΠΏ

CVE-2014-9365

ΠžΠΏΡƒΠ±Π»ΠΈΠΊΠΎΠ²Π°Π½ΠΎ: 12 Π΄Π΅ΠΊ. 2014
Π˜ΡΡ‚ΠΎΡ‡Π½ΠΈΠΊ: ubuntu
ΠŸΡ€ΠΈΠΎΡ€ΠΈΡ‚Π΅Ρ‚: medium
EPSS Низкий
CVSS2: 5.8

ОписаниС

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Π Π΅Π»ΠΈΠ·Π‘Ρ‚Π°Ρ‚ΡƒΡΠŸΡ€ΠΈΠΌΠ΅Ρ‡Π°Π½ΠΈΠ΅
artful

not-affected

devel

not-affected

esm-infra-legacy/trusty

ignored

esm-infra/xenial

not-affected

precise

ignored

end of life
precise/esm

ignored

trusty

ignored

trusty/esm

ignored

upstream

released

2.7.9-1
vivid

not-affected

2.7.9-2ubuntu3

ΠŸΠΎΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ ΠΏΠΎ

Π Π΅Π»ΠΈΠ·Π‘Ρ‚Π°Ρ‚ΡƒΡΠŸΡ€ΠΈΠΌΠ΅Ρ‡Π°Π½ΠΈΠ΅
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

vivid/stable-phone-overlay

DNE

ΠŸΠΎΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ ΠΏΠΎ

Π Π΅Π»ΠΈΠ·Π‘Ρ‚Π°Ρ‚ΡƒΡΠŸΡ€ΠΈΠΌΠ΅Ρ‡Π°Π½ΠΈΠ΅
artful

DNE

devel

DNE

esm-infra-legacy/trusty

released

3.4.3-1ubuntu1~14.04.2
precise

DNE

precise/esm

DNE

trusty

released

3.4.3-1ubuntu1~14.04.2
trusty/esm

released

3.4.3-1ubuntu1~14.04.2
upstream

released

3.4.3
vivid

not-affected

3.4.3-3
vivid/stable-phone-overlay

not-affected

3.4.3-3

ΠŸΠΎΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ ΠΏΠΎ

Бсылки Π½Π° источники

EPSS

ΠŸΡ€ΠΎΡ†Π΅Π½Ρ‚ΠΈΠ»ΡŒ: 83%
0.02036
Низкий

5.8 Medium

CVSS2

БвязанныС уязвимости

CVSS3: 4.7
redhat
ΠΏΠΎΡ‡Ρ‚ΠΈ 11 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

nvd
ΠΏΠΎΡ‡Ρ‚ΠΈ 11 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

debian
ΠΏΠΎΡ‡Ρ‚ΠΈ 11 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) ...

github
большС 3 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

oracle-oval
ΠΎΠΊΠΎΠ»ΠΎ 8 Π»Π΅Ρ‚ Π½Π°Π·Π°Π΄

ELSA-2017-1868: python security and bug fix update (MODERATE)

EPSS

ΠŸΡ€ΠΎΡ†Π΅Π½Ρ‚ΠΈΠ»ΡŒ: 83%
0.02036
Низкий

5.8 Medium

CVSS2

Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡ‚ΡŒ CVE-2014-9365