~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
PublicDateAtUSN: 2013-05-02
Candidate: CVE-2013-2037
PublicDate: 2014-01-18
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2037
 http://www.ubuntu.com/usn/usn-1948-1
Description:
 httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does
 not verify that the server hostname matches a domain name in the subject's
 Common Name (CN) or subjectAltName field of the X.509 certificate, which
 allows man-in-the-middle attackers to spoof SSL servers via an arbitrary
 valid certificate.
Ubuntu-Description:
Notes:
 mdeslaur> upstream hasn't taken fix as of 2013-09-03
 mdeslaur> Debian added it to 0.8-2
Bugs:
 http://code.google.com/p/httplib2/issues/detail?id=282
 https://bugs.launchpad.net/httplib2/+bug/1175272
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706602
Priority: medium
Discovered-by:
Assigned-to: mdeslaur

Patches_python-httplib2:
upstream_python-httplib2: released (0.8-2)
hardy_python-httplib2: ignored (reached end-of-life)
lucid_python-httplib2: released (0.7.2-1ubuntu2~0.10.04.2)
oneiric_python-httplib2: ignored (reached end-of-life)
precise_python-httplib2: released (0.7.2-1ubuntu2.1)
quantal_python-httplib2: released (0.7.4-2ubuntu0.1)
raring_python-httplib2: released (0.7.7-1ubuntu0.1)
devel_python-httplib2: not-affected (0.8-2)