New submission from STINNER Victor: Attached pull request backports a fix for this security vulnerability: http://python-security.readthedocs.io/vuln/cve-2016-0772_smtplib_tls_stripping.html
"A vulnerability in smtplib allowing MITM attacker to perform a startTLS stripping attack. smtplib does not seem to raise an exception when the remote end (SMTP server) is capable of negotiating starttls but fails to respond with 220 (ok) to an explicit call of SMTP.starttls(). This may allow a malicious MITM to perform a startTLS stripping attack if the client code does not explicitly check the response code for startTLS." Reported by: Tin (Team Oststrom) Python 2.7, 3.4, 3.5 and 3.6 are already safe. ---------- messages: 295319 nosy: georg.brandl, haypo priority: release blocker pull_requests: 2047 severity: normal status: open title: [security][3.3] Backport smtplib fix for TLS stripping vulnerability, CVE-2016-0772 type: security versions: Python 3.3 _______________________________________ Python tracker <rep...@bugs.python.org> <http://bugs.python.org/issue30585> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com