CVE-2013-4238 — Improper Input Validation in Python
Severity
4.3MEDIUMNVD
OSV5.9
EPSS
1.4%
top 19.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 18
Latest updateMay 13
Description
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
CVSS vector
AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9
Affected Packages6 packages
Also affects: Ubuntu Linux 10.04
Patches
🔴Vulnerability Details
2📋Vendor Advisories
7💬Community
16Bugzilla▶
CVE-2013-4238 python26: python: hostname check bypassing vulnerability in SSL module [epel-5]↗2013-08-20
Bugzilla
▶
Bugzilla▶
CVE-2013-4238 python-requests: python: hostname check bypassing vulnerability in SSL module [fedora-all]↗2013-08-13
Bugzilla▶
CVE-2013-4238 python-backports-ssl_match_hostname: python: hostname check bypassing vulnerability in SSL module [epel-6]↗2013-08-13