[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

StartTLS stripping attack vulnerability in smtplib library in Python

ID: oval:org.secpod.oval:def:37882Date: (C)2016-11-04   (M)2023-12-20
Class: VULNERABILITYFamily: windows




The host is installed with Python 2.7.0 before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 and is prone to a StartTLS stripping attack vulnerability. A flaw is present in the application, which does not return an error when StartTLS fails. Successful exploitation could allow attackers to bypass the TLS protections by leveraging a network position between the client and the registry.

Platform:
Microsoft Windows Server 2022
Microsoft Windows 11
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows 10
Product:
Python
Reference:
CVE-2016-0772
CVE    1
CVE-2016-0772
CPE    24
cpe:/a:python:python:3.0
cpe:/a:python:python:3.2.5
cpe:/a:python:python:3.3.4
cpe:/a:python:python:3.2.6
...

© SecPod Technologies