An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758
https://access.redhat.com/errata/RHSA-2019:3520
https://access.redhat.com/errata/RHSA-2019:3725
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
https://security.gentoo.org/glsa/202003-26
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
Source: MITRE
Published: 2019-10-31
Updated: 2022-07-28
Type: CWE-476
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH