PyOpenSSL Mishandles NUL Byte In Certificate Subject Alternative Name
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Oct 24, 2024
Description
Published by the National Vulnerability Database
Sep 30, 2013
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Feb 23, 2024
Last updated
Oct 24, 2024
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a
\0
character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.References