Vulnerability Description
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jean-Paul Calderone | Pyopenssl | <= 0.13 |
| Canonical | Ubuntu Linux | 10.04 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html
- http://www.debian.org/security/2013/dsa-2763
- http://www.openwall.com/lists/oss-security/2013/09/06/2
- http://www.ubuntu.com/usn/USN-1965-1Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1005325
- https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html
- http://www.debian.org/security/2013/dsa-2763
- http://www.openwall.com/lists/oss-security/2013/09/06/2
- http://www.ubuntu.com/usn/USN-1965-1Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1005325
- https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html
FAQ
What is CVE-2013-4314?
CVE-2013-4314 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle at...
How severe is CVE-2013-4314?
CVE-2013-4314 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4314?
Check the references section above for vendor advisories and patch information. Affected products include: Jean-Paul Calderone Pyopenssl, Canonical Ubuntu Linux.