Ubuntu 12.10 / 13.04 : python3.3 vulnerabilities (USN-1985-1)

Medium Nessus Plugin ID 70269


The remote Ubuntu host is missing one or more security-related patches.


Florian Weimer discovered that Python incorrectly handled matching multiple wildcards in ssl certificate hostnames. An attacker could exploit this to cause Python to consume resources, resulting in a denial of service. (CVE-2013-2099)

Ryan Sleevi discovered that Python did not properly handle certificates with NULL characters in the Subject Alternative Name field. An attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications. (CVE-2013-4238).

Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected python3.3 and / or python3.3-minimal packages.

Plugin Details

Severity: Medium

ID: 70269

File Name: ubuntu_USN-1985-1.nasl

Version: $Revision: 1.5 $

Type: local

Agent: unix

Published: 2013/10/02

Modified: 2016/05/25

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:canonical:ubuntu_linux:python3.3, p-cpe:/a:canonical:ubuntu_linux:python3.3-minimal, cpe:/o:canonical:ubuntu_linux:12.10, cpe:/o:canonical:ubuntu_linux:13.04

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/10/01

Reference Information

CVE: CVE-2013-2099, CVE-2013-4238

BID: 59877, 61738

USN: 1985-1