Revision Date: | 2014-12-12 | Version: | 1 | Title: | CVE-2014-9365 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | The HTTP clients in the (1) httplib, (2) urllib, (3) urllib2, and (4) xmlrpclib libraries in CPython (aka Python) 2.x before 2.7.9 and 3.x before 3.4.3, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2014-9365
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT idle-python2.7 package in xenial, while related to the CVE in some way, is not affected.
OR NOT libpython2.7 package in xenial, while related to the CVE in some way, is not affected.
OR NOT libpython2.7-minimal package in xenial, while related to the CVE in some way, is not affected.
OR NOT libpython2.7-stdlib package in xenial, while related to the CVE in some way, is not affected.
OR NOT libpython2.7-testsuite package in xenial, while related to the CVE in some way, is not affected.
OR NOT python2.7 package in xenial, while related to the CVE in some way, is not affected.
OR NOT python2.7-examples package in xenial, while related to the CVE in some way, is not affected.
OR NOT python2.7-minimal package in xenial, while related to the CVE in some way, is not affected.
|
|