Medium: python-rsa

2020-08-26T23:09:00
ID ALAS-2020-1421
Type amazon
Reporter Amazon
Modified 2020-08-26T23:09:00

Description

Issue Overview:

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). A flaw was found in the python-rsa package, where it does not explicitly check the ciphertext length against the key size and ignores the leading 0 bytes during the decryption of the ciphertext. This flaw allows an attacker to perform a ciphertext attack, leading to a denial of service. The highest threat from this vulnerability is to confidentiality. (CVE-2020-13757 __)

Affected Packages:

python-rsa

Issue Correction:
Run yum update python-rsa to update your system.

New Packages:

noarch:  
    python26-rsa-3.4.1-1.9.amzn1.noarch  
    python27-rsa-3.4.1-1.9.amzn1.noarch

src:  
    python-rsa-3.4.1-1.9.amzn1.src