// For flags

CVE-2013-4314

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.

La X509Extension en pyOpenSSL ante de 0.13.1 no maneja apropiadamente el carácter "\0" en el nombre de dominio en el campo Subject Alternative Name de un certificado X.509 que permite a atacantes man-in-the-middle suplantar servidores SSL a través de un un certificado manipulado emitido por una autoridad de certificación legítima

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-09-13 CVE Published
  • 2023-05-13 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
<= 0.13
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version " <= 0.13"
-
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.7
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.7"
-
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.8
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.8"
a1
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.9
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.9"
-
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.10
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.10"
-
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.11
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.11"
-
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.11
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.11"
a1
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.11
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.11"
a2
Affected
Jean-paul Calderone
Search vendor "Jean-paul Calderone"
Pyopenssl
Search vendor "Jean-paul Calderone" for product "Pyopenssl"
0.12
Search vendor "Jean-paul Calderone" for product "Pyopenssl" and version "0.12"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
10.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
13.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "13.04"
-
Affected