Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2014-9365
HistoryDec 12, 2014 - 11:59 a.m.

CVE-2014-9365

2014-12-1211:59:00
Debian Security Bug Tracker
security-tracker.debian.org
15

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.006 Low

EPSS

Percentile

77.6%

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject’s (b) Common Name or © subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

OSVersionArchitecturePackageVersionFilename
Debian11allpython2.7< 2.7.9-1python2.7_2.7.9-1_all.deb
Debian10allpython2.7< 2.7.9-1python2.7_2.7.9-1_all.deb

5.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.006 Low

EPSS

Percentile

77.6%