[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2763-1 pyopenssl -- hostname check bypassing

ID: oval:org.secpod.oval:def:601112Date: (C)2013-09-25   (M)2022-10-10
Class: PATCHFamily: unix




It was discovered that PyOpenSSL, a Python wrapper around the OpenSSL library, does not properly handle certificates with NULL characters in the Subject Alternative Name field. A remote attacker in the position to obtain a certificate for "www.foo.org\0.example.com" from a CA that a SSL client trusts, could use this to spoof "www.foo.org" and conduct man-in-the-middle attacks between the PyOpenSSL-using client and the SSL server.

Platform:
Debian 7.0
Debian 6.0
Product:
python-openssl
Reference:
DSA-2763-1
CVE-2013-4314
CVE    1
CVE-2013-4314
CPE    3
cpe:/a:jean-paul_calderone:python-openssl
cpe:/o:debian:debian_linux:6.0
cpe:/o:debian:debian_linux:7.0

© SecPod Technologies