[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2013-4238

Date: (C)2013-08-20   (M)2016-07-22
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Reference:
http://seclists.org/fulldisclosure/2014/Dec/23
DSA-2880
RHSA-2013:1582
USN-1982-1
http://bugs.python.org/issue18709
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=996381
openSUSE-SU-2013:1437
openSUSE-SU-2013:1438
openSUSE-SU-2013:1439
openSUSE-SU-2013:1440
openSUSE-SU-2013:1462
openSUSE-SU-2013:1463

CPE    39
cpe:/a:python:python:3.2.2150
cpe:/a:python:python:3.4:alpha1
cpe:/a:python:python:3.3:beta2
cpe:/a:python:python:3.1.2150::~~~~x64~
...
CWE    1
CWE-20
OVAL    20
oval:org.secpod.oval:def:105846
oval:org.secpod.oval:def:701444
oval:org.secpod.oval:def:107928
oval:org.secpod.oval:def:501140
...

© 2013 SecPod Technologies