How to Buy
This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote Amazon Linux AMI host is missing a security update.
It was discovered that multiple Python standard library modules
implementing network protocols (such as httplib or smtplib) failed to
restrict sizes of server responses. A malicious server could cause a
client using one of the affected modules to consume an excessive
amount of memory. (CVE-2013-1752)
The ssl.match_hostname function in the SSL module in Python 2.6
through 3.4 does not properly handle a '\0' character in a domain name
in the Subject Alternative Name field of an X.509 certificate, which
allows man-in-the-middle attackers to spoof arbitrary SSL servers via
a crafted certificate issued by a legitimate Certification Authority,
a related issue to CVE-2009-2408 . (CVE-2013-4238)
See also :
Run 'yum update python26' to update your system.
Risk factor :
Medium / CVSS Base Score : 4.3
Family: Amazon Linux Local Security Checks
Nessus Plugin ID: 70903 ()
CVE ID: CVE-2013-1752CVE-2013-4238
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.