Lucene search

K
cve[email protected]CVE-2014-9365
HistoryDec 12, 2014 - 11:59 a.m.

CVE-2014-9365

2014-12-1211:59:07
web.nvd.nist.gov
389
python
ssl
certificate validation
cve-2014-9365
security vulnerability
httplib
urllib
urllib2
xmlrpclib

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.1 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.9%

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject’s (b) Common Name or © subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

Affected configurations

NVD
Node
pythonpythonMatch2.0
OR
pythonpythonMatch2.0.1
OR
pythonpythonMatch2.1
OR
pythonpythonMatch2.1.1
OR
pythonpythonMatch2.1.2
OR
pythonpythonMatch2.1.3
OR
pythonpythonMatch2.2
OR
pythonpythonMatch2.2.1
OR
pythonpythonMatch2.2.2
OR
pythonpythonMatch2.2.3
OR
pythonpythonMatch2.3.1
OR
pythonpythonMatch2.3.2
OR
pythonpythonMatch2.3.3
OR
pythonpythonMatch2.3.4
OR
pythonpythonMatch2.3.5
OR
pythonpythonMatch2.3.7
OR
pythonpythonMatch2.4.1
OR
pythonpythonMatch2.4.2
OR
pythonpythonMatch2.4.3
OR
pythonpythonMatch2.4.4
OR
pythonpythonMatch2.4.6
OR
pythonpythonMatch2.5.1
OR
pythonpythonMatch2.5.2
OR
pythonpythonMatch2.5.3
OR
pythonpythonMatch2.5.4
OR
pythonpythonMatch2.5.6
OR
pythonpythonMatch2.5.150
OR
pythonpythonMatch2.6.1
OR
pythonpythonMatch2.6.2
OR
pythonpythonMatch2.6.3
OR
pythonpythonMatch2.6.4
OR
pythonpythonMatch2.6.5
OR
pythonpythonMatch2.6.6
OR
pythonpythonMatch2.6.7
OR
pythonpythonMatch2.6.8
OR
pythonpythonMatch2.6.2150
OR
pythonpythonMatch2.6.6150
OR
pythonpythonMatch2.7.1
OR
pythonpythonMatch2.7.1rc1
OR
pythonpythonMatch2.7.2rc1
OR
pythonpythonMatch2.7.3
OR
pythonpythonMatch2.7.4
OR
pythonpythonMatch2.7.5
OR
pythonpythonMatch2.7.6
OR
pythonpythonMatch2.7.7
OR
pythonpythonMatch2.7.8
OR
pythonpythonMatch2.7.1150
OR
pythonpythonMatch2.7.1150x64
OR
pythonpythonMatch2.7.2150
OR
pythonpythonMatch3.0
OR
pythonpythonMatch3.0.1
OR
pythonpythonMatch3.1
OR
pythonpythonMatch3.1.1
OR
pythonpythonMatch3.1.2
OR
pythonpythonMatch3.1.3
OR
pythonpythonMatch3.1.4
OR
pythonpythonMatch3.1.5
OR
pythonpythonMatch3.1.2150x64
OR
pythonpythonMatch3.2
OR
pythonpythonMatch3.2alpha
OR
pythonpythonMatch3.2.0
OR
pythonpythonMatch3.2.1
OR
pythonpythonMatch3.2.2
OR
pythonpythonMatch3.2.3
OR
pythonpythonMatch3.2.4
OR
pythonpythonMatch3.2.5
OR
pythonpythonMatch3.2.6
OR
pythonpythonMatch3.2.2150
OR
pythonpythonMatch3.3
OR
pythonpythonMatch3.3beta2
OR
pythonpythonMatch3.3.0
OR
pythonpythonMatch3.3.1
OR
pythonpythonMatch3.3.1rc1
OR
pythonpythonMatch3.3.2
OR
pythonpythonMatch3.3.3
OR
pythonpythonMatch3.3.3rc1
OR
pythonpythonMatch3.3.3rc2
OR
pythonpythonMatch3.3.4
OR
pythonpythonMatch3.3.4rc1
OR
pythonpythonMatch3.3.5-
OR
pythonpythonMatch3.3.5rc1
OR
pythonpythonMatch3.3.5rc2
OR
pythonpythonMatch3.3.6rc1
OR
pythonpythonMatch3.4alpha1
OR
pythonpythonMatch3.4.0
OR
pythonpythonMatch3.4.1
OR
pythonpythonMatch3.4.2
Node
applemac_os_xRange10.10.4

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.1 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

77.9%