6.5

CVE-2016-0772

The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Data is provided by the National Vulnerability Database (NVD)
PythonPython Version3.5.0
PythonPython Version3.5.1
PythonPython Version3.0
PythonPython Version3.0.1
PythonPython Version3.1.0
PythonPython Version3.1.1
PythonPython Version3.1.2
PythonPython Version3.1.3
PythonPython Version3.1.4
PythonPython Version3.1.5
PythonPython Version3.2.0
PythonPython Version3.2.1
PythonPython Version3.2.2
PythonPython Version3.2.3
PythonPython Version3.2.4
PythonPython Version3.2.5
PythonPython Version3.2.6
PythonPython Version3.3.0
PythonPython Version3.3.1
PythonPython Version3.3.2
PythonPython Version3.3.3
PythonPython Version3.3.4
PythonPython Version3.3.5
PythonPython Version3.3.6
PythonPython Version3.4.0
PythonPython Version3.4.1
PythonPython Version3.4.2
PythonPython Version3.4.3
PythonPython Version3.4.4
PythonPython Version <= 2.7.11
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 13.18% 0.939
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.2 4.2
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.