ALAS-2013-241


Amazon Linux 1 Security Advisory: ALAS-2013-241
Advisory Release Date: 2013-11-03 12:09 Pacific
Advisory Updated Date: 2015-06-22 10:35 Pacific
Severity: Medium

Issue Overview:

It was discovered that multiple Python standard library modules implementing network protocols (such as httplib or smtplib) failed to restrict sizes of server responses. A malicious server could cause a client using one of the affected modules to consume an excessive amount of memory. (CVE-2013-1752)

The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. (CVE-2013-4238)


Affected Packages:

python26


Issue Correction:
Run yum update python26 to update your system.

New Packages:
i686:
    python26-devel-2.6.9-1.40.amzn1.i686
    python26-2.6.9-1.40.amzn1.i686
    python26-test-2.6.9-1.40.amzn1.i686
    python26-tools-2.6.9-1.40.amzn1.i686
    python26-libs-2.6.9-1.40.amzn1.i686
    python26-debuginfo-2.6.9-1.40.amzn1.i686

src:
    python26-2.6.9-1.40.amzn1.src

x86_64:
    python26-tools-2.6.9-1.40.amzn1.x86_64
    python26-2.6.9-1.40.amzn1.x86_64
    python26-debuginfo-2.6.9-1.40.amzn1.x86_64
    python26-test-2.6.9-1.40.amzn1.x86_64
    python26-libs-2.6.9-1.40.amzn1.x86_64
    python26-devel-2.6.9-1.40.amzn1.x86_64