Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2013.0252
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2013-0252)
Resumen:The remote host is missing an update for the 'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) announced via the MGASA-2013-0252 advisory.
Descripción:Summary:
The remote host is missing an update for the 'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) announced via the MGASA-2013-0252 advisory.

Vulnerability Insight:
Updated python3 packages fix security vulnerabilities:

A denial of service flaw was found in the way SSL module implementation of
Python 3 performed matching of the certificate's name in the case it contained
many '*' wildcard characters. A remote attacker, able to obtain valid
certificate with its name containing a lot of '*' wildcard characters could use
this flaw to cause denial of service (excessive CPU consumption) by issuing
request to validate such a certificate for / to an application using the
Python's ssl.match_hostname() functionality (CVE-2013-2099).

Ryan Sleevi of the Google Chrome Security Team has discovered that Python's SSL
module doesn't handle NULL bytes inside subjectAltNames general names. This
could lead to a breach when an application uses ssl.match_hostname() to match
the hostname against the certificate's subjectAltName's dNSName general names.
(CVE-2013-4238).

Additionally, a linking issue when compiling C extensions for Python 3 has been
fixed in Mageia 3 (mga#9395).

The CVE-2013-2099 issue also affects bzr, python-requests, python-tornado,
python-pip, and python-virtualenv, and those have been updated as well.

Affected Software/OS:
'bzr, python3, python-pip, python-requests, python-tornado, python-virtualenv' package(s) on Mageia 2, Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-2099
55107
http://secunia.com/advisories/55107
55116
http://secunia.com/advisories/55116
RHSA-2014:1690
http://rhn.redhat.com/errata/RHSA-2014-1690.html
RHSA-2016:1166
https://access.redhat.com/errata/RHSA-2016:1166
USN-1983-1
http://www.ubuntu.com/usn/USN-1983-1
USN-1984-1
http://www.ubuntu.com/usn/USN-1984-1
USN-1985-1
http://www.ubuntu.com/usn/USN-1985-1
[oss-security] 20130515 Re: CVE Request (minor) -- Python 3.2: DoS when matching certificate with many '*' wildcard characters {was: CVE Request (minor) -- python-backports-ssl_match_hostname: Denial of service when matching certificate with many '*' wildcard characters }
http://www.openwall.com/lists/oss-security/2013/05/16/6
http://bugs.python.org/issue17980
https://bugzilla.redhat.com/show_bug.cgi?id=963260
Common Vulnerability Exposure (CVE) ID: CVE-2013-4238
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
http://seclists.org/fulldisclosure/2014/Dec/23
http://www.securityfocus.com/archive/1/534161/100/0/threaded
DSA-2880
http://www.debian.org/security/2014/dsa-2880
RHSA-2013:1582
http://rhn.redhat.com/errata/RHSA-2013-1582.html
USN-1982-1
http://www.ubuntu.com/usn/USN-1982-1
http://bugs.python.org/issue18709
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=996381
openSUSE-SU-2013:1437
http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html
openSUSE-SU-2013:1438
http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html
openSUSE-SU-2013:1439
http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html
openSUSE-SU-2013:1440
http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html
openSUSE-SU-2013:1462
http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html
openSUSE-SU-2013:1463
http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html
openSUSE-SU-2020:0086
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.