[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2013-241 ---- python26

ID: oval:org.secpod.oval:def:1600316Date: (C)2016-05-19   (M)2023-10-10
Class: PATCHFamily: unix




It was discovered that multiple Python standard library modules implementing network protocols failed to restrict sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a "\0" character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408

Platform:
Amazon Linux AMI
Product:
python26
Reference:
ALAS-2013-241
CVE-2013-4238
CVE    1
CVE-2013-4238
CPE    2
cpe:/o:amazon:linux
cpe:/a:python:python26

© SecPod Technologies