4.3
CVSSv2

CVE-2013-2099

Published: 09/10/2013 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and previous versions, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote malicious users to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

Vulnerable Product Search on Vulmon Subscribe to Product

python python 3.3.2

python python 3.2.2

python python 3.2.5

python python 3.2.1

python python 3.2.0

python python 3.3.1

python python 3.2.3

python python 3.3.0

python python 3.2.4

canonical ubuntu linux 13.04

canonical ubuntu linux 12.10

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Low: cloud-init security, bug fix, and enhancement update Type/Severity Security Advisory: Low Topic Updated cloud-init packages that fix one security issue, several bugs, andadd various enhancements are now available for Red Hat Common for Red HatEnterprise Linux 6Red Hat Product Security has rat ...
Debian Bug report logs - #708530 python3: CVE-2013-2099: sslmatch_hostname() trips over crafted wildcard Package: python33; Maintainer for python33 is (unknown); Reported by: Henri Salo <henri@nervfi> Date: Thu, 16 May 2013 13:04:55 UTC Severity: normal Tags: fixed-upstream, security Found in version python33/331-1 ...
Several security issues were fixed in Python ...
Several security issues were fixed in Python ...
Several security issues were fixed in Python ...
A denial of service flaw was found in the way Python's SSL module implementation performed matching of certain certificate names A remote attacker able to obtain a valid certificate that contained multiple wildcard characters could use this flaw to issue a request to validate such a certificate, resulting in excessive consumption of CPU ...
A denial of service flaw was found in the way Python's SSL module implementation performed matching of certain certificate names A remote attacker able to obtain a valid certificate that contained multiple wildcard characters could use this flaw to issue a request to validate such a certificate, resulting in excessive consumption of CPU ...