The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Opensuse Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-25-1 python2.6 security update
Debian DSA Debian DSA DSA-2880-1 python2.7 security update
EUVD EUVD EUVD-2013-4142 The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Ubuntu USN Ubuntu USN USN-1982-1 Python 2.6 vulnerability
Ubuntu USN Ubuntu USN USN-1983-1 Python 2.7 vulnerabilities
Ubuntu USN Ubuntu USN USN-1984-1 Python 3.2 vulnerabilities
Ubuntu USN Ubuntu USN USN-1985-1 Python 3.3 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T16:38:01.666Z

Reserved: 2013-06-12T00:00:00.000Z

Link: CVE-2013-4238

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-08-18T02:52:22.943

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-4238

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-08-12T00:00:00Z

Links: CVE-2013-4238 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses