![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2013.0252 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2013-0252) |
Resumen: | The remote host is missing an update for the 'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) announced via the MGASA-2013-0252 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) announced via the MGASA-2013-0252 advisory. Vulnerability Insight: Updated python3 packages fix security vulnerabilities: A denial of service flaw was found in the way SSL module implementation of Python 3 performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters could use this flaw to cause denial of service (excessive CPU consumption) by issuing request to validate such a certificate for / to an application using the Python's ssl.match_hostname() functionality (CVE-2013-2099). Ryan Sleevi of the Google Chrome Security Team has discovered that Python's SSL module doesn't handle NULL bytes inside subjectAltNames general names. This could lead to a breach when an application uses ssl.match_hostname() to match the hostname against the certificate's subjectAltName's dNSName general names. (CVE-2013-4238). Additionally, a linking issue when compiling C extensions for Python 3 has been fixed in Mageia 3 (mga#9395). The CVE-2013-2099 issue also affects bzr, python-requests, python-tornado, python-pip, and python-virtualenv, and those have been updated as well. Affected Software/OS: 'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) on Mageia 2, Mageia 3. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-2099 55107 http://secunia.com/advisories/55107 55116 http://secunia.com/advisories/55116 RHSA-2014:1690 http://rhn.redhat.com/errata/RHSA-2014-1690.html RHSA-2016:1166 https://access.redhat.com/errata/RHSA-2016:1166 USN-1983-1 http://www.ubuntu.com/usn/USN-1983-1 USN-1984-1 http://www.ubuntu.com/usn/USN-1984-1 USN-1985-1 http://www.ubuntu.com/usn/USN-1985-1 [oss-security] 20130515 Re: CVE Request (minor) -- Python 3.2: DoS when matching certificate with many '*' wildcard characters {was: CVE Request (minor) -- python-backports-ssl_match_hostname: Denial of service when matching certificate with many '*' wildcard characters } http://www.openwall.com/lists/oss-security/2013/05/16/6 http://bugs.python.org/issue17980 https://bugzilla.redhat.com/show_bug.cgi?id=963260 Common Vulnerability Exposure (CVE) ID: CVE-2013-4238 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities http://seclists.org/fulldisclosure/2014/Dec/23 http://www.securityfocus.com/archive/1/534161/100/0/threaded DSA-2880 http://www.debian.org/security/2014/dsa-2880 RHSA-2013:1582 http://rhn.redhat.com/errata/RHSA-2013-1582.html USN-1982-1 http://www.ubuntu.com/usn/USN-1982-1 http://bugs.python.org/issue18709 http://www.vmware.com/security/advisories/VMSA-2014-0012.html https://bugzilla.redhat.com/show_bug.cgi?id=996381 openSUSE-SU-2013:1437 http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html openSUSE-SU-2013:1438 http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html openSUSE-SU-2013:1439 http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html openSUSE-SU-2013:1440 http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html openSUSE-SU-2013:1462 http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html openSUSE-SU-2013:1463 http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html openSUSE-SU-2020:0086 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |