[New-bugs-announce] [issue30585] [security][3.3] Backport smtplib fix for TLS stripping vulnerability, CVE-2016-0772

STINNER Victor report at bugs.python.org
Wed Jun 7 04:36:32 EDT 2017


New submission from STINNER Victor:

Attached pull request backports a fix for this security vulnerability:
http://python-security.readthedocs.io/vuln/cve-2016-0772_smtplib_tls_stripping.html

"A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (SMTP server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS."

Reported by: Tin (Team Oststrom)

Python 2.7, 3.4, 3.5 and 3.6 are already safe.

----------
messages: 295319
nosy: georg.brandl, haypo
priority: release blocker
pull_requests: 2047
severity: normal
status: open
title: [security][3.3] Backport smtplib fix for TLS stripping vulnerability, CVE-2016-0772
type: security
versions: Python 3.3

_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue30585>
_______________________________________


More information about the New-bugs-announce mailing list