ALAS-2013-241 ---- python26ID: oval:org.secpod.oval:def:1600316 | Date: (C)2016-05-19 (M)2023-10-10 |
Class: PATCH | Family: unix |
It was discovered that multiple Python standard library modules implementing network protocols failed to restrict sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a "\0" character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408
Platform: |
Amazon Linux AMI |