First published: Wed May 15 2013(Updated: )
A denial of service flaw was found in the way SSL module implementation of Python3, version 3 of the Python programming language (aka Python 3000), performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters could use this flaw to cause denial of service (excessive CPU consumption) by issuing request to validate such a certificate for / to an application using the Python's ssl.match_hostname() functionality. Upstream bug report: [1] <a href="http://bugs.python.org/issue17980">http://bugs.python.org/issue17980</a> CVE request: [2] <a href="http://www.openwall.com/lists/oss-security/2013/05/15/6">http://www.openwall.com/lists/oss-security/2013/05/15/6</a> (is for python-backports-ssl_match_hostname, but that code comes from Python 3.2 ssl module implementation) [3] <a href="http://www.openwall.com/lists/oss-security/2013/05/15/7">http://www.openwall.com/lists/oss-security/2013/05/15/7</a> Acknowledgements: Name: Florian Weimer (Red Hat Product Security)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | =3.2.0 | |
Python Python | =3.2.1 | |
Python Python | =3.2.2 | |
Python Python | =3.2.3 | |
Python Python | =3.2.4 | |
Python Python | =3.2.5 | |
Python Python | =3.3.0 | |
Python Python | =3.3.1 | |
Python Python | =3.3.2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.04 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.