Vulnerability CVE-2013-2099


Published: 2013-10-09

Description:
Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
python backports ssl_match_hostname Resource Exhaustion 0day
Florian Weimer
15.05.2013

Type:

CWE-399

(Resource Management Errors)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Python -> Python 
Canonical -> Ubuntu linux 

 References:
http://bugs.python.org/issue17980
https://bugzilla.redhat.com/show_bug.cgi?id=963260
https://access.redhat.com/errata/RHSA-2016:1166
http://www.ubuntu.com/usn/USN-1985-1
http://www.ubuntu.com/usn/USN-1984-1
http://www.ubuntu.com/usn/USN-1983-1
http://www.openwall.com/lists/oss-security/2013/05/16/6
http://rhn.redhat.com/errata/RHSA-2014-1690.html

Copyright 2024, cxsecurity.com

 

Back to Top