CVE-2013-2099

medium

Description

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

References

https://bugzilla.redhat.com/show_bug.cgi?id=963260

https://access.redhat.com/errata/RHSA-2016:1166

http://www.ubuntu.com/usn/USN-1985-1

http://www.ubuntu.com/usn/USN-1984-1

http://www.ubuntu.com/usn/USN-1983-1

http://www.openwall.com/lists/oss-security/2013/05/16/6

http://secunia.com/advisories/55116

http://secunia.com/advisories/55107

http://rhn.redhat.com/errata/RHSA-2014-1690.html

http://bugs.python.org/issue17980

Details

Source: Mitre, NVD

Published: 2013-10-09

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Severity: Medium