The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-25-1 python2.6 security update
Debian DSA Debian DSA DSA-2880-1 python2.7 security update
EUVD EUVD EUVD-2013-4142 The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Ubuntu USN Ubuntu USN USN-1982-1 Python 2.6 vulnerability
Ubuntu USN Ubuntu USN USN-1983-1 Python 2.7 vulnerabilities
Ubuntu USN Ubuntu USN USN-1984-1 Python 3.2 vulnerabilities
Ubuntu USN Ubuntu USN USN-1985-1 Python 3.3 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T16:38:01.666Z

Reserved: 2013-06-12T00:00:00

Link: CVE-2013-4238

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-08-18T02:52:22.943

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-4238

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-08-12T00:00:00Z

Links: CVE-2013-4238 - Bugzilla

cve-icon OpenCVE Enrichment

No data.