An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2019:3520 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3725 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html | mailing list third party advisory vendor advisory |
https://security.gentoo.org/glsa/202003-26 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html | third party advisory mailing list |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E | mailing list |
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html | third party advisory mailing list |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758 | third party advisory exploit |