CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
High
EPSS
Percentile
74.9%
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
Vendor | Product | Version | CPE |
---|---|---|---|
dlitz | pycrypto | * | cpe:2.3:a:dlitz:pycrypto:*:*:*:*:*:*:*:* |
dlitz | pycrypto | 1.0.0 | cpe:2.3:a:dlitz:pycrypto:1.0.0:*:*:*:*:*:*:* |
dlitz | pycrypto | 1.0.1 | cpe:2.3:a:dlitz:pycrypto:1.0.1:*:*:*:*:*:*:* |
dlitz | pycrypto | 1.0.2 | cpe:2.3:a:dlitz:pycrypto:1.0.2:*:*:*:*:*:*:* |
dlitz | pycrypto | 1.1 | cpe:2.3:a:dlitz:pycrypto:1.1:alpha2:*:*:*:*:*:* |
dlitz | pycrypto | 1.9 | cpe:2.3:a:dlitz:pycrypto:1.9:alpha1:*:*:*:*:*:* |
dlitz | pycrypto | 1.9 | cpe:2.3:a:dlitz:pycrypto:1.9:alpha2:*:*:*:*:*:* |
dlitz | pycrypto | 1.9 | cpe:2.3:a:dlitz:pycrypto:1.9:alpha3:*:*:*:*:*:* |
dlitz | pycrypto | 1.9 | cpe:2.3:a:dlitz:pycrypto:1.9:alpha4:*:*:*:*:*:* |
dlitz | pycrypto | 1.9 | cpe:2.3:a:dlitz:pycrypto:1.9:alpha5:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html
lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html
lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html
secunia.com/advisories/49263
www.debian.org/security/2012/dsa-2502
www.mandriva.com/security/advisories?name=MDVSA-2012:117
www.openwall.com/lists/oss-security/2012/05/25/1
www.osvdb.org/82279
www.securityfocus.com/bid/53687
bugs.launchpad.net/pycrypto/+bug/985164
exchange.xforce.ibmcloud.com/vulnerabilities/75871
github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog
github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2
hermes.opensuse.org/messages/15083589