4.3

CVE-2013-4238

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version10.04 Update- Editionlts
PythonPython Version2.6.1
PythonPython Version2.6.2
PythonPython Version2.6.3
PythonPython Version2.6.4
PythonPython Version2.6.5
PythonPython Version2.6.6
PythonPython Version2.6.7
PythonPython Version2.6.8
PythonPython Version2.6.2150
PythonPython Version2.6.6150
PythonPython Version2.7.1
PythonPython Version2.7.1 Updaterc1
PythonPython Version2.7.2 Updaterc1
PythonPython Version2.7.3
PythonPython Version2.7.1150
PythonPython Version2.7.1150 HwPlatformx64
PythonPython Version2.7.2150
PythonPython Version3.0
PythonPython Version3.0.1
PythonPython Version3.1
PythonPython Version3.1.1
PythonPython Version3.1.2
PythonPython Version3.1.3
PythonPython Version3.1.4
PythonPython Version3.1.5
PythonPython Version3.1.2150 HwPlatformx64
PythonPython Version3.2
PythonPython Version3.2 Updatealpha
PythonPython Version3.2.3
PythonPython Version3.2.2150
PythonPython Version3.3
PythonPython Version3.3 Updatebeta2
PythonPython Version3.4 Updatealpha1
OpensuseOpensuse Version11.4
OpensuseOpensuse Version12.2
OpensuseOpensuse Version12.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.03% 0.88
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.