4.3
CVSSv2

CVE-2013-4238

Published: 18/08/2013 Updated: 25/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ssl.match_hostname function in the SSL module in Python 2.6 up to and including 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vendor Advisories

Synopsis Moderate: python security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix one security issue, several bugs, and addone enhancement are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this upd ...
Debian Bug report logs - #719566 python27: CVE-2013-4238: Python SSL module does not handle certificates that contain hostnames with NULL bytes Package: python27; Maintainer for python27 is Matthias Klose <doko@debianorg>; Source for python27 is src:python27 (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <c ...
Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet ...
Several security issues were fixed in Python ...
Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes multiple security issues andone bug is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impact C ...
Several security issues were fixed in Python ...
Multiple security issues were discovered in Python: CVE-2013-4238 Ryan Sleevi discovered that NULL characters in the subject alternate names of SSL cerficates were parsed incorrectly CVE-2014-1912 Ryan Smith-Roberts discovered a buffer overflow in the socketrecvfrom_into() function For the stable distribution (wheezy), these pr ...
The sslmatch_hostname function in the SSL module in Python 26 through 34 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a rela ...
Several security issues were fixed in Python ...
The sslmatch_hostname function in the SSL module in Python 26 through 34 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a rela ...
It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict sizes of server responses A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory (CVE-2013-1752 ) The sslmatch_hostname function in the SSL modu ...