{"id":"USN-4308-2","summary":"twisted vulnerabilities","details":"USN-4308-1 fixed several vulnerabilities in Twisted. This update provides\nthe corresponding update for Ubuntu 14.04 ESM.\n\nOriginal advisory details:\n\n it was discovered that Twisted incorrectly validated or sanitized certain\n URIs or HTTP methods. A remote attacker could use this issue to inject\n invalid characters and possibly perform header injection attacks.\n (CVE-2019-12387)\n\n It was discovered that Twisted incorrectly verified XMPP TLS certificates.\n A remote attacker could possibly use this issue to perform a\n machine-in-the-middle attack and obtain sensitive information. (CVE-2019-12855)\n\n Jake Miller and ZeddYu Lu discovered that Twisted incorrectly handled\n certain content-length headers. A remote attacker could possibly use this\n issue to perform HTTP request splitting attacks. (CVE-2020-10108,\n CVE-2020-10109)\n","modified":"2026-02-10T04:41:48Z","published":"2020-03-30T12:00:51Z","related":["UBUNTU-CVE-2019-12387","UBUNTU-CVE-2019-12855","UBUNTU-CVE-2020-10108","UBUNTU-CVE-2020-10109"],"upstream":["CVE-2019-12387","CVE-2019-12855","CVE-2020-10108","CVE-2020-10109","UBUNTU-CVE-2019-12387","UBUNTU-CVE-2019-12855","UBUNTU-CVE-2020-10108","UBUNTU-CVE-2020-10109"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4308-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12387"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-12855"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10108"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-10109"}],"affected":[{"package":{"name":"twisted","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/twisted@13.2.0-1ubuntu1.2+esm1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"13.2.0-1ubuntu1.2+esm1"}]}],"versions":["13.0.0-1ubuntu1","13.2.0-1ubuntu1","13.2.0-1ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-bin"},{"binary_version":"1:13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-conch"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-core"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-lore"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-mail"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-names"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-news"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-runner"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-web"},{"binary_version":"13.2.0-1ubuntu1.2+esm1","binary_name":"python-twisted-words"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4308-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-12387"},{"severity":[{"score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2019-12855"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10108"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-10109"}]}}}],"schema_version":"1.7.3"}