Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=963260 | |
http://www.ubuntu.com/usn/USN-1984-1 | vendor advisory |
http://secunia.com/advisories/55116 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2016:1166 | vendor advisory |
http://www.ubuntu.com/usn/USN-1985-1 | vendor advisory |
http://bugs.python.org/issue17980 | patch |
http://secunia.com/advisories/55107 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-1690.html | vendor advisory |
http://www.ubuntu.com/usn/USN-1983-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/05/16/6 | mailing list |