UBUNTU-CVE-2013-6396

Source
https://ubuntu.com/security/CVE-2013-6396
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-6396.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2013-6396
Upstream
Withdrawn
2025-07-18T16:42:56Z
Published
2014-02-18T19:55:00Z
Modified
2025-07-16T07:31:28.281344Z
Severity
  • Ubuntu - low
Summary
[none]
Details

The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

References

Affected packages

Ubuntu:14.04:LTS / python-swiftclient

Package

Name
python-swiftclient
Purl
pkg:deb/ubuntu/python-swiftclient@1:2.0.3-0ubuntu1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.0.3-0ubuntu1

Affected versions

1:1.*
1:1.6.0-0ubuntu1
1:1.8.0-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:2.0.3-0ubuntu1",
            "binary_name": "python-swiftclient"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-6396.json"