An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0758 | Exploit Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3520 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:3725 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202003-26 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html | Mailing List Third Party Advisory |
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-10-31 14:15
Updated : 2022-07-28 04:23
NVD link : CVE-2019-5010
Mitre link : CVE-2019-5010
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
python
- python
redhat
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_server_tus
- enterprise_linux_eus
opensuse
- leap
debian
- debian_linux