CVE-2012-5825

NameCVE-2012-5825
DescriptionTweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs692444

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tweepy (PTS)jessie2.3-1vulnerable
stretch3.5.0-1fixed
buster, sid3.6.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tweepysource(unstable)3.1.0-2low692444

Notes

[jessie] - tweepy <no-dsa> (Minor issue)
[wheezy] - tweepy <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems