First published: Wed May 15 2013(Updated: )
A denial of service flaw was found in the way SSL module implementation of Python3, version 3 of the Python programming language (aka Python 3000), performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters could use this flaw to cause denial of service (excessive CPU consumption) by issuing request to validate such a certificate for / to an application using the Python's ssl.match_hostname() functionality. Upstream bug report: [1] <a href="http://bugs.python.org/issue17980">http://bugs.python.org/issue17980</a> CVE request: [2] <a href="http://www.openwall.com/lists/oss-security/2013/05/15/6">http://www.openwall.com/lists/oss-security/2013/05/15/6</a> (is for python-backports-ssl_match_hostname, but that code comes from Python 3.2 ssl module implementation) [3] <a href="http://www.openwall.com/lists/oss-security/2013/05/15/7">http://www.openwall.com/lists/oss-security/2013/05/15/7</a> Acknowledgements: Name: Florian Weimer (Red Hat Product Security)
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | >3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-963260 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-963260, you should update to a later version of Python that addresses this vulnerability.
REDHAT-BUG-963260 affects Python version 3.0.
REDHAT-BUG-963260 is associated with a remote denial of service attack that exploits SSL certificate matching.
Yes, REDHAT-BUG-963260 can impact server performance by causing service disruptions when exploited.