CVE-2013-4238

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
Link Resource
http://bugs.python.org/issue18709 Patch
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1582.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.debian.org/security/2014/dsa-2880
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.ubuntu.com/usn/USN-1982-1 Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=996381 Patch
http://bugs.python.org/issue18709 Patch
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html Vendor Advisory
http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-1582.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.debian.org/security/2014/dsa-2880
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.ubuntu.com/usn/USN-1982-1 Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=996381 Patch
Configurations

Configuration 1 (hide)

cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*
cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*
cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*
cpe:2.3:a:python:python:3.4:alpha1:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://bugs.python.org/issue18709 - Patch () http://bugs.python.org/issue18709 - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html - () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html -
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html - Vendor Advisory () http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-1582.html - () http://rhn.redhat.com/errata/RHSA-2013-1582.html -
References () http://seclists.org/fulldisclosure/2014/Dec/23 - () http://seclists.org/fulldisclosure/2014/Dec/23 -
References () http://www.debian.org/security/2014/dsa-2880 - () http://www.debian.org/security/2014/dsa-2880 -
References () http://www.securityfocus.com/archive/1/534161/100/0/threaded - () http://www.securityfocus.com/archive/1/534161/100/0/threaded -
References () http://www.ubuntu.com/usn/USN-1982-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-1982-1 - Vendor Advisory
References () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - () http://www.vmware.com/security/advisories/VMSA-2014-0012.html -
References () https://bugzilla.redhat.com/show_bug.cgi?id=996381 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=996381 - Patch

Information

Published : 2013-08-18 02:52

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4238

Mitre link : CVE-2013-4238

CVE.ORG link : CVE-2013-4238


JSON object : View

Products Affected

canonical

  • ubuntu_linux

opensuse

  • opensuse

python

  • python
CWE
CWE-20

Improper Input Validation