CVE-2016-0772

Priority
Description
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before
3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails,
which might allow man-in-the-middle attackers to bypass the TLS protections
by leveraging a network position between the client and the registry to
block the StartTLS command, aka a "StartTLS stripping attack."
Notes
 sbeattie> issue is fixed for xenial/python3.5 and xenial/python2.7
  for packages in xenial-updates, but not xenial-security
Package
Upstream:released (2.7.12~rc1-1)
Ubuntu 12.04 ESM (Precise Pangolin):released (2.7.3-0ubuntu3.9)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.7.6-8ubuntu0.3)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.7.12-1ubuntu0~16.04.1)
Patches:
Upstream:https://hg.python.org/cpython/rev/b3ce713fb9be
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [3.2.3-0ubuntu3.8])
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (3.4.3-1ubuntu1~14.04.5)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:https://hg.python.org/cpython/rev/d590114c2394
Package
Upstream:released (3.5.2~rc1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):released (3.5.2-2ubuntu0~16.04.1)
More Information

Updated: 2018-10-31 21:22:03 UTC (commit cfa7cf69d76449ccff972ac22f40976a08d908c2)