Scientific Linux Security Update : python on SL6.x i386/x86_64 (20131121)

medium Nessus Plugin ID 71199

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way the Python SSL module handled X.509 certificate fields that contain a NULL byte. An attacker could potentially exploit this flaw to conduct man-in-the-middle attacks to spoof SSL servers. Note that to exploit this issue, an attacker would need to obtain a carefully crafted certificate signed by an authority that the client trusts. (CVE-2013-4238)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?bf3bc296

Plugin Details

Severity: Medium

ID: 71199

File Name: sl_20131121_python_on_SL6_x.nasl

Version: 1.7

Type: local

Agent: unix

Published: 12/4/2013

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:python, p-cpe:/a:fermilab:scientific_linux:python-debuginfo, p-cpe:/a:fermilab:scientific_linux:python-devel, p-cpe:/a:fermilab:scientific_linux:python-libs, p-cpe:/a:fermilab:scientific_linux:python-test, p-cpe:/a:fermilab:scientific_linux:python-tools, p-cpe:/a:fermilab:scientific_linux:tkinter, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/21/2013

Vulnerability Publication Date: 8/18/2013

Reference Information

CVE: CVE-2013-4238