Lucene search

K
cve[email protected]CVE-2013-4314
HistorySep 30, 2013 - 9:55 p.m.

CVE-2013-4314

2013-09-3021:55:09
CWE-20
web.nvd.nist.gov
35
cve-2013-4314
x509extension
pyopenssl
ssl
certificate
man-in-the-middle
spoofing
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.0%

The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a ‘\0’ character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

Affected configurations

NVD
Node
jean-paul_calderonepyopensslRange0.13
OR
jean-paul_calderonepyopensslMatch0.7
OR
jean-paul_calderonepyopensslMatch0.8a1
OR
jean-paul_calderonepyopensslMatch0.9
OR
jean-paul_calderonepyopensslMatch0.10
OR
jean-paul_calderonepyopensslMatch0.11
OR
jean-paul_calderonepyopensslMatch0.11a1
OR
jean-paul_calderonepyopensslMatch0.11a2
OR
jean-paul_calderonepyopensslMatch0.12
Node
canonicalubuntu_linuxMatch10.04-lts
OR
canonicalubuntu_linuxMatch12.04-lts
OR
canonicalubuntu_linuxMatch12.10
OR
canonicalubuntu_linuxMatch13.04

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

AI Score

Confidence

Low

0.002 Low

EPSS

Percentile

52.0%