Safety vulnerability ID: 35417
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Qpid-python 0.22 includes a fix for CVE-2013-1909: The Python client in Apache Qpid before 0.22 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
https://issues.apache.org/jira/browse/QPID-4918
Latest version: 1.36.0-1
Python client implementation and AMQP conformance tests for Apache Qpid
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
CONFIRM:http://qpid.apache.org/releases/qpid-0.22/release-notes.html: http://qpid.apache.org/releases/qpid-0.22/release-notes.html
CONFIRM:http://svn.apache.org/viewvc?view=revision&revision=1460013: http://svn.apache.org/viewvc?view=revision&revision=1460013
CONFIRM:https://issues.apache.org/jira/browse/QPID-4918: https://issues.apache.org/jira/browse/QPID-4918
REDHAT:RHSA-2013:1024: http://rhn.redhat.com/errata/RHSA-2013-1024.html
SECUNIA:53968: http://secunia.com/advisories/53968
SECUNIA:54137: http://secunia.com/advisories/54137
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application