UBUNTU-CVE-2014-9365

Source
https://ubuntu.com/security/CVE-2014-9365
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-9365.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2014-9365
Related
Published
2014-12-12T11:59:00Z
Modified
2025-01-13T10:21:07Z
Summary
[none]
Details

The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

References

Affected packages

Ubuntu:Pro:14.04:LTS / python2.7

Package

Name
python2.7
Purl
pkg:deb/ubuntu/python2.7@2.7.6-8ubuntu0.6+esm22?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.7.5-8ubuntu3
2.7.5-8ubuntu4
2.7.6-2
2.7.6-2ubuntu1
2.7.6-3
2.7.6-3ubuntu1
2.7.6-4
2.7.6-4ubuntu1
2.7.6-5
2.7.6-7
2.7.6-8
2.7.6-8ubuntu0.2
2.7.6-8ubuntu0.3
2.7.6-8ubuntu0.4
2.7.6-8ubuntu0.5
2.7.6-8ubuntu0.6+esm2
2.7.6-8ubuntu0.6+esm3
2.7.6-8ubuntu0.6+esm5
2.7.6-8ubuntu0.6+esm6
2.7.6-8ubuntu0.6+esm7
2.7.6-8ubuntu0.6+esm8
2.7.6-8ubuntu0.6+esm9
2.7.6-8ubuntu0.6+esm10
2.7.6-8ubuntu0.6+esm11
2.7.6-8ubuntu0.6+esm12
2.7.6-8ubuntu0.6+esm13
2.7.6-8ubuntu0.6+esm14
2.7.6-8ubuntu0.6+esm15
2.7.6-8ubuntu0.6+esm16
2.7.6-8ubuntu0.6+esm17
2.7.6-8ubuntu0.6+esm18
2.7.6-8ubuntu0.6+esm20
2.7.6-8ubuntu0.6+esm21
2.7.6-8ubuntu0.6+esm22

Ecosystem specific

{
    "ubuntu_priority": "medium"
}