4.3
CVSSv2

CVE-2013-4238

Published: 18/08/2013 Updated: 25/10/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ssl.match_hostname function in the SSL module in Python 2.6 up to and including 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 10.04

python python 2.6.1

python python 2.6.7

python python 2.6.8

python python 2.7.2150

python python 2.7.3

python python 3.1.3

python python 3.1.4

python python 2.6.3

python python 2.6.4

python python 2.6.5

python python 2.7.1

python python 2.7.1150

python python 3.1

python python 3.1.1

python python 3.2.2150

python python 3.2.3

python python 2.6.2

python python 2.6.2150

python python 3.0

python python 3.0.1

python python 3.1.5

python python 3.2

python python 3.4

python python 2.6.6

python python 2.6.6150

python python 2.7.2

python python 3.1.2

python python 3.1.2150

python python 3.3

opensuse opensuse 11.4

opensuse opensuse 12.3

opensuse opensuse 12.2

Vendor Advisories

Debian Bug report logs - #719566 python27: CVE-2013-4238: Python SSL module does not handle certificates that contain hostnames with NULL bytes Package: python27; Maintainer for python27 is Matthias Klose <doko@debianorg>; Source for python27 is src:python27 (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <c ...
Synopsis Moderate: python security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated python packages that fix one security issue, several bugs, and addone enhancement are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this upd ...
Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes multiple security issues andone bug is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impact C ...
Multiple security issues were discovered in Python: CVE-2013-4238 Ryan Sleevi discovered that NULL characters in the subject alternate names of SSL cerficates were parsed incorrectly CVE-2014-1912 Ryan Smith-Roberts discovered a buffer overflow in the socketrecvfrom_into() function For the stable distribution (wheezy), these pr ...
Several security issues were fixed in Python ...
Fraudulent security certificates could allow sensitive information to be exposed when accessing the Internet ...
Several security issues were fixed in Python ...
Several security issues were fixed in Python ...
It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict sizes of server responses A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory (CVE-2013-1752) The sslmatch_hostname function in the SSL modul ...
The sslmatch_hostname function in the SSL module in Python 26 through 34 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a rela ...
The sslmatch_hostname function in the SSL module in Python 26 through 34 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a rela ...