CVE-2013-4314

The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
jean-paul_calderonepyopenssl
𝑥
≤ 0.13
jean-paul_calderonepyopenssl
0.7
jean-paul_calderonepyopenssl
0.8:a1
jean-paul_calderonepyopenssl
0.9
jean-paul_calderonepyopenssl
0.10
jean-paul_calderonepyopenssl
0.11
jean-paul_calderonepyopenssl
0.11:a1
jean-paul_calderonepyopenssl
0.11:a2
jean-paul_calderonepyopenssl
0.12
canonicalubuntu_linux
10.04
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
canonicalubuntu_linux
13.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pyopenssl
bullseye
20.0.1-1
fixed
bookworm
23.0.0-1
fixed
sid
24.2.1-1
fixed
trixie
24.2.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pyopenssl
raring
Fixed 0.13-2ubuntu3.1
released
quantal
Fixed 0.13-2ubuntu1.1
released
precise
Fixed 0.12-1ubuntu2.1
released
lucid
Fixed 0.10-1ubuntu0.1
released