Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-2099


Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.


Published

2013-10-09T14:53:20.230

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-399

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application python python 3.2.0 Yes
Application python python 3.2.1 Yes
Application python python 3.2.2 Yes
Application python python 3.2.3 Yes
Application python python 3.2.4 Yes
Application python python 3.2.5 Yes
Application python python 3.3.0 Yes
Application python python 3.3.1 Yes
Application python python 3.3.2 Yes
Operating System canonical ubuntu_linux 12.04 Yes
Operating System canonical ubuntu_linux 12.10 Yes
Operating System canonical ubuntu_linux 13.04 Yes

References