CVE-2014-9365

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-9365
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2014-9365.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2014-9365
Aliases
Related
Published
2014-12-12T11:59:07Z
Modified
2024-11-21T02:20:42Z
Downstream
Summary
[none]
Details

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

References

Affected packages

Debian:11 / python2.7

Package

Name
python2.7
Purl
pkg:deb/debian/python2.7?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}