Vulnerability Details : CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
Products affected by CVE-2016-0772
- cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:python:python:3.5.1:*:*:*:*:*:*:*
Threat overview for CVE-2016-0772
Top countries where our scanners detected CVE-2016-0772
Top open port discovered on systems with this issue
8123
IPs affected by CVE-2016-0772 139,141
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-0772!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-0772
10.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-0772
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N |
2.2
|
4.2
|
NIST |
CWE ids for CVE-2016-0772
-
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-0772
-
http://www.securityfocus.com/bid/91225
Python smtplib CVE-2016-0772 Man in the Middle Security Bypass Vulnerability
-
https://hg.python.org/cpython/rev/d590114c2394
cpython: d590114c2394Patch
-
http://rhn.redhat.com/errata/RHSA-2016-1627.html
RHSA-2016:1627 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-1630.html
RHSA-2016:1630 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2016/06/14/9
oss-security - Python CVE-2016-0772: smtplib StartTLS stripping attackMailing List
-
https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
[SECURITY] [DLA 1663-1] python3.4 security update
-
http://rhn.redhat.com/errata/RHSA-2016-1629.html
RHSA-2016:1629 - Security Advisory - Red Hat Customer Portal
-
https://security.gentoo.org/glsa/201701-18
Python: Multiple vulnerabilities (GLSA 201701-18) — Gentoo security
-
https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
Release Notes
-
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
[security-announce] openSUSE-SU-2020:0086-1: important: Security update
-
https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
Changelog — Python 3.4.10 documentationRelease Notes
-
https://hg.python.org/cpython/rev/b3ce713fb9be
cpython: b3ce713fb9bePatch
-
http://rhn.redhat.com/errata/RHSA-2016-1628.html
RHSA-2016:1628 - Security Advisory - Red Hat Customer Portal
-
http://www.splunk.com/view/SP-CAAAPUE
Splunk Enterprise 6.4.5 addresses multiple vulnerabilities | Splunk
-
http://rhn.redhat.com/errata/RHSA-2016-1626.html
RHSA-2016:1626 - Security Advisory - Red Hat Customer Portal
-
http://www.splunk.com/view/SP-CAAAPSV
Splunk Enterprise 6.5.1 addresses multiple OpenSSL vulnerabilities | Splunk
-
https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
Changelog — Python 3.5.7 documentationRelease Notes
-
https://bugzilla.redhat.com/show_bug.cgi?id=1303647
1303647 – (CVE-2016-0772) CVE-2016-0772 python: smtplib StartTLS stripping attackIssue Tracking;Third Party Advisory
Jump to