CVE-2014-9365 in Python情報

要約 (英語)

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

予約する

2014年12月11日

公開

2014年12月12日

ステータス

確認済み

エントリ

VulDB provides additional information and datapoints for this CVE:

識別子脆弱性CWE悪用可対策CVE
68433Python TLS 弱い認証295未実証公式な修正CVE-2014-9365

ソース

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!