Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02NzQ4LTM2cXAtZng2cs4AAe3I
PyOpenSSL Mishandles NUL Byte In Certificate Subject Alternative Name
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a \0
character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02NzQ4LTM2cXAtZng2cs4AAe3I
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: 3 months ago
Identifiers: GHSA-6748-36qp-fx6r, CVE-2013-4314
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-4314
- https://bugzilla.redhat.com/show_bug.cgi?id=1005325
- https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html
- http://www.debian.org/security/2013/dsa-2763
- http://www.openwall.com/lists/oss-security/2013/09/06/2
- http://www.ubuntu.com/usn/USN-1965-1
- https://github.com/pyca/pyopenssl/commit/6bbf44a00b35fb28df1f66aa194b2fe95eab1ab2
- https://github.com/advisories/GHSA-6748-36qp-fx6r
Blast Radius: 0.0
Affected Packages
pypi:pyOpenSSL
Dependent packages: 417Dependent repositories: 13,020
Downloads: 100,968,224 last month
Affected Version Ranges: < 0.13.1
Fixed in: 0.13.1
All affected versions:
All unaffected versions: 0.13.1, 0.15.1, 16.0.0, 16.1.0, 16.2.0, 17.0.0, 17.1.0, 17.2.0, 17.3.0, 17.4.0, 17.5.0, 18.0.0, 19.0.0, 19.1.0, 20.0.0, 20.0.1, 21.0.0, 22.0.0, 22.1.0, 23.0.0, 23.1.0, 23.1.1, 23.2.0, 23.3.0, 24.0.0, 24.1.0