|
|
| |
|
| |
python-backports-ssl_match_hostname: denial of service
| Package(s): | python-backports-ssl_match_hostname |
CVE #(s): | CVE-2013-2098
|
| Created: | May 30, 2013 |
Updated: | May 30, 2013 |
| Description: |
From the Red Hat bugzilla:
A denial of service flaw was found in the way python-backports-ssl_match_hostname, an implementation that brings the ssl.match_hostname() function from Python 3.2 to users of earlier versions of Python, performed matching of the certificate's name in the case it contained many '*' wildcard characters. A remote attacker, able to obtain valid certificate with its name containing a lot of '*' wildcard characters, could use this flaw to cause denial of service (excessive CPU time consumption) by issuing request to validate that certificate for / in an application using the python-backports-ssl_match_hostname functionality.
See the upstream bug report for additional information. |
| Alerts: |
|
( Log in to post comments)
|
|
|