CVE-2013-7440
Publication date 7 June 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The ssl.match_hostname function in CPython (aka Python) before 2.7.9 and 3.x before 3.3.3 does not properly handle wildcards in hostnames, which might allow man-in-the-middle attackers to spoof servers via a crafted certificate.
Status
Package | Ubuntu Release | Status |
---|---|---|
python2.7 | ||
14.04 LTS trusty |
Not affected
|
|
python3.2 | ||
14.04 LTS trusty | Not in release | |
python3.4 | ||
14.04 LTS trusty |
Not affected
|
|
Notes
tyhicks
This CVE is specifically for the multiple wildcards issue and not the change in behavior from RFC 2818 to RFC 6125 Note that revision 10d0edadbcdd changes the behavior over to RFC 6125 which may cause compatibability issues in old releases
mdeslaur
since this introduces a behaviour change, we will not be fixing this in stable releases.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |