Cisco Talos added the comment:
The files are removed and will be reissued to PSIRT.
Regina Wilson
Analyst.Business Operations
regiw...@cisco.com<mailto:regiw...@cisco.com>
[cid:CFA14CB5-B7B2-4FF7-8313-22D495F607D5@vrt.sourcefire.com]
On Jan 15, 2019, at 12:11 PM, Cisco Talos
mail
Change by Cisco Talos :
Removed file: https://bugs.python.org/file48053/TALOS-2019-0758 - POC.pem
___
Python tracker
<https://bugs.python.org/issue35746>
___
___
Pytho
Change by Cisco Talos :
Removed file: https://bugs.python.org/file48052/TALOS-2019-0758.txt
___
Python tracker
<https://bugs.python.org/issue35746>
___
___
Python-bug
Cisco Talos added the comment:
Thanks for acknowledging. We look forward to any updates/developments on the
issue reported.
For further information about the Cisco Vendor Vulnerability Reporting and
Disclosure Policy please refer to this document which also links to our public
PGP key
Change by Cisco Talos :
--
versions: -Python 3.4, Python 3.5, Python 3.6, Python 3.7, Python 3.8
Added file: https://bugs.python.org/file48053/TALOS-2019-0758 - POC.pem
___
Python tracker
<https://bugs.python.org/issue35
New submission from Cisco Talos :
An exploitable denial-of-service vulnerability exists in the X509 certificate
parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509
certificate can cause a NULL pointer dereference, resulting in a denial of
service. An attacker can initiate or