Executive Summary

Informations
Name CVE-2023-40217 First vendor Publication 2023-08-25
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Overall CVSS Score 5.3
Base Score 5.3 Environmental Score 5.3
impact SubScore 1.4 Temporal Score 5.3
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 328

Sources (Detail)

https://mail.python.org/archives/list/security-announce%40python.org/thread/P...
Source Url
CONFIRM https://security.netapp.com/advisory/ntap-20231006-0014/
MISC https://www.python.org/dev/security/
MLIST https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
Date Informations
2024-02-02 02:47:52
  • Multiple Updates
2024-02-01 12:30:51
  • Multiple Updates
2023-12-09 13:35:29
  • Multiple Updates
2023-11-07 21:28:06
  • Multiple Updates
2023-10-12 05:27:38
  • Multiple Updates
2023-10-06 21:27:47
  • Multiple Updates
2023-09-21 05:27:37
  • Multiple Updates
2023-09-05 05:27:28
  • Multiple Updates
2023-09-05 01:29:48
  • Multiple Updates
2023-09-02 05:27:31
  • Multiple Updates
2023-09-02 01:30:14
  • Multiple Updates
2023-08-31 21:27:24
  • Multiple Updates
2023-08-25 09:27:20
  • First insertion