First published: Fri Sep 06 2013(Updated: )
The pyOpenSSL module implements hostname identity checks but it did not properly handle hostnames in the certificate that contain null bytes. In all releases prior to 0.13.1, the string formatting of subjectAltName X509Extension instances incorrectly truncated fields of the name when encountering the null byte. When a CA than an SSL client trusts issues a server certificate that has a null byte in the subjectAltName, remote attackers can obtain a certifcate for 'www.foo.org\0.example.com' from the CA to spoof 'www.foo.org' and conduct man-in-the-middle attacks between the pyOpenSSL-using client and SSL servers. [1] <a href="https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html">https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jean-paul Calderone Pyopenssl | <=0.13 | |
Jean-paul Calderone Pyopenssl | =0.7 | |
Jean-paul Calderone Pyopenssl | =0.8-a1 | |
Jean-paul Calderone Pyopenssl | =0.9 | |
Jean-paul Calderone Pyopenssl | =0.10 | |
Jean-paul Calderone Pyopenssl | =0.11 | |
Jean-paul Calderone Pyopenssl | =0.11-a1 | |
Jean-paul Calderone Pyopenssl | =0.11-a2 | |
Jean-paul Calderone Pyopenssl | =0.12 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
Canonical Ubuntu Linux | =13.04 | |
pip/pyOpenSSL | <0.13.1 | 0.13.1 |
redhat/pyOpenSSL | <0.13.1 | 0.13.1 |
<=0.13 | ||
=0.7 | ||
=0.8-a1 | ||
=0.9 | ||
=0.10 | ||
=0.11 | ||
=0.11-a1 | ||
=0.11-a2 | ||
=0.12 | ||
=10.04 | ||
=12.04 | ||
=12.10 | ||
=13.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.