2.6
CVSSv2

CVE-2013-2037

Published: 18/01/2014 Updated: 06/12/2018
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

httplib2 0.7.2, 0.8, and previous versions, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof SSL servers via an arbitrary valid certificate.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 13.04

canonical ubuntu linux 10.04

canonical ubuntu linux 12.04

canonical ubuntu linux 12.10

httplib2 project httplib2

httplib2 project httplib2 0.8

Vendor Advisories

Debian Bug report logs - #706602 python-httplib2: CVE-2013-2037 Package: python-httplib2; Maintainer for python-httplib2 is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Source for python-httplib2 is src:python-httplib2 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> ...
Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet ...
httplib2 072, 08, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate ...