Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
2013-10-09T14:53:20.230
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:N/A:P
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | python | python | 3.2.0 | Yes |
Application | python | python | 3.2.1 | Yes |
Application | python | python | 3.2.2 | Yes |
Application | python | python | 3.2.3 | Yes |
Application | python | python | 3.2.4 | Yes |
Application | python | python | 3.2.5 | Yes |
Application | python | python | 3.3.0 | Yes |
Application | python | python | 3.3.1 | Yes |
Application | python | python | 3.3.2 | Yes |
Operating System | canonical | ubuntu_linux | 12.04 | Yes |
Operating System | canonical | ubuntu_linux | 12.10 | Yes |
Operating System | canonical | ubuntu_linux | 13.04 | Yes |