backports.ssl_match_hostname@3.2a3 vulnerabilities

The ssl.match_hostname() function from Python 3.5

  • latest version

    3.7.0.1

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    6 years ago

  • licenses detected

    • [3.2a3,3.4.0.1)
  • Direct Vulnerabilities

    Known vulnerabilities in the backports.ssl_match_hostname package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Denial of Service (DoS)

    backports.ssl_match_hostname is a The ssl.match_hostname() function from Python 3.5

    Affected versions of this package are vulnerable to Denial of Service attacks. Algorithmic complexity vulnerability in the ssl.match_hostname function in Python 3.2.x, 3.3.x, and earlier, and unspecified versions of python-backports-ssl_match_hostname as used for older Python versions, allows remote attackers to cause a denial of service (CPU consumption) via multiple wildcard characters in the common name in a certificate.

    How to fix Denial of Service (DoS)?

    Upgrade to version 3.3.3 or greater.

    [,3.4.0.1)