CVE-2013-4314
https://notcve.org/view.php?id=CVE-2013-4314
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. La X509Extension en pyOpenSSL ante de 0.13.1 no maneja apropiadamente el carácter "\0" en el nombre de dominio en el campo Subject Alternative Name de un certificado X.509 que permite a atacantes man-in-the-middle suplantar servidores SSL a través de un un certificado manipulado emitido por una autoridad de certificación legítima • http://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html http://www.debian.org/security/2013/dsa-2763 http://www.openwall.com/lists/oss-security/2013/09/06/2 http://www.ubuntu.com/usn/USN-1965-1 https://bugzilla.redhat.com/show_bug.cgi?id=1005325 https://mail.python.org/pipermail/pyopenssl-users/2013-September/000478.html • CWE-20: Improper Input Validation •
CVE-2013-1060
https://notcve.org/view.php?id=CVE-2013-1060
A certain Ubuntu build procedure for perf, as distributed in the Linux kernel packages in Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, and 13.10, sets the HOME environment variable to the ~buildd directory and consequently reads the system configuration file from the ~buildd directory, which allows local users to gain privileges by leveraging control over the buildd account. Cierto procedimiento build de Ubuntu para perf, tal y como es distribuido en los paquetes del kernel Linux en Ubuntu 10.04 LTS, 12.04 LTS, 12.10, 13.04, y 13.10, establece la variable de entorno HOME al directorio ~buildd y consecuentemente lee el fichero de configuración del sistema del directorio ~buildd, lo cual permite a usuarios locales obtener privilegios aprovechando el control sobre la cuenta buildd. • http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1060.html http://www.ubuntu.com/usn/USN-1938-1 http://www.ubuntu.com/usn/USN-1939-1 http://www.ubuntu.com/usn/USN-1941-1 http://www.ubuntu.com/usn/USN-1942-1 http://www.ubuntu.com/usn/USN-1943-1 http://www.ubuntu.com/usn/USN-1944-1 http://www.ubuntu.com/usn/USN-1945-1 http://www.ubuntu.com/usn/USN-1946-1 http://www.ubuntu.com/usn/USN-1947-1 https://launchpad • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-4238 – python: hostname check bypassing vulnerability in SSL module
https://notcve.org/view.php?id=CVE-2013-4238
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. La función ssl.match_hostname en el módulo SSL en Python v2.6 hasta v3.4 no manejar adecuadamente un carácter “\0” en un nombre de dominio en el campo Subject Alternative Name de un certificado X.509, lo que permite a atacantes "man-in-the-middle" suplantar servidores SSL de su elección mediante un certificado manipulado expedido por una Autoridad Certificadora legítima, un problema relacionado con CVE-2009-2408 • http://bugs.python.org/issue18709 http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html • CWE-20: Improper Input Validation •
CVE-2013-4248 – php: hostname check bypassing vulnerability in SSL client
https://notcve.org/view.php?id=CVE-2013-4248
The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. La función openssl_x509_parse en openssl.c en el módulo OpenSSL en PHP anterior a v5.4.18 y v5.5.x anterior v5.5.2 no manejar adecuadamente un carácter “\0” en un nombre de dominio en el campo Subject Alternative Name de un certificado X.509, lo que permite a atacantes "man-in-the-middle" suplantar servidores SSL de su elección mediante un certificado manipulado expedido por una Autoridad Certificadora legítima, un problema relacionado con CVE-2009-2408. • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=2874696a5a8d46639d261571f915c493cd875897 http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html http://marc.info/?l=bugtraq&m=141390017113542&w=2 http://rhn.redhat.com/errata/RHSA-2013-1307.html http://rhn.redhat.com/errata/RHSA-2013-1615.html http://secunia.com/advisories/54478 http://secunia.com/advisories/54657 http://secunia.com/advisories/55078 http: • CWE-20: Improper Input Validation •
CVE-2013-4124 – Samba 3.5.22/3.6.17/4.0.8 - nttrans Reply Integer Overflow
https://notcve.org/view.php?id=CVE-2013-4124
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet. Desbordamiento de entero en la función read_nttrans_ea_list en nttrans.c en smbd en Samba v3.x anterior a v3.5.22, v3.6.x anterior a v3.6.17, y v4.x anterior a v4.0.8 permite a atacantes remotos causar una denegación de servicio (por excesivo consumo de memoria) a través de un paquete con formato erróneo. Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet. Important Note: in order to work, the "ea support" option on the target share must be enabled. • https://www.exploit-db.com/exploits/27778 http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012 • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •