6.5

CVE-2016-0772

The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PythonPython Version3.5.0
PythonPython Version3.5.1
PythonPython Version3.0
PythonPython Version3.0.1
PythonPython Version3.1.0
PythonPython Version3.1.1
PythonPython Version3.1.2
PythonPython Version3.1.3
PythonPython Version3.1.4
PythonPython Version3.1.5
PythonPython Version3.2.0
PythonPython Version3.2.1
PythonPython Version3.2.2
PythonPython Version3.2.3
PythonPython Version3.2.4
PythonPython Version3.2.5
PythonPython Version3.2.6
PythonPython Version3.3.0
PythonPython Version3.3.1
PythonPython Version3.3.2
PythonPython Version3.3.3
PythonPython Version3.3.4
PythonPython Version3.3.5
PythonPython Version3.3.6
PythonPython Version3.4.0
PythonPython Version3.4.1
PythonPython Version3.4.2
PythonPython Version3.4.3
PythonPython Version3.4.4
PythonPython Version <= 2.7.11
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 13.18% 0.939
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.2 4.2
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:P/A:N
CWE-693 Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.