httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugs.launchpad.net/httplib2/+bug/1175272 | patch exploit |
http://seclists.org/oss-sec/2013/q2/257 | third party advisory mailing list |
http://code.google.com/p/httplib2/issues/detail?id=282 | third party advisory exploit |
http://www.ubuntu.com/usn/USN-1948-1 | third party advisory vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706602 | mailing list third party advisory issue tracking |
http://www.securityfocus.com/bid/52179 | third party advisory vdb entry |