// For flags

CVE-2013-2099

python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

Vulnerabilidad de la complejidad algorítmica en la función ssl.match_hostname en Python 3.2.x, 3.3.x, y anteriores, y las versiones no especificadas de python-backports-ssl_match_hostname como las usadas por versiones anteriores de Python, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU ) a través de múltiples caracteres comodín en el nombre común en el certificado.

A denial of service flaw was found in the way Python's SSL module implementation performed matching of certain certificate names. A remote attacker able to obtain a valid certificate that contained multiple wildcard characters could use this flaw to issue a request to validate such a certificate, resulting in excessive consumption of CPU.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-19 CVE Reserved
  • 2013-09-10 CVE Published
  • 2023-05-22 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
  • CWE-407: Inefficient Algorithmic Complexity
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.0
Search vendor "Python" for product "Python" and version "3.2.0"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.1
Search vendor "Python" for product "Python" and version "3.2.1"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.2
Search vendor "Python" for product "Python" and version "3.2.2"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.3
Search vendor "Python" for product "Python" and version "3.2.3"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.4
Search vendor "Python" for product "Python" and version "3.2.4"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.2.5
Search vendor "Python" for product "Python" and version "3.2.5"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.0
Search vendor "Python" for product "Python" and version "3.3.0"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.1
Search vendor "Python" for product "Python" and version "3.3.1"
-
Affected
Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
3.3.2
Search vendor "Python" for product "Python" and version "3.3.2"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
13.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "13.04"
-
Affected