Dlitz Pycrypto vulnerabilities
4 known vulnerabilities affecting dlitz/pycrypto.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2018-6594HIGHCVSS 7.5≤ 2.6.12018-02-03
CVE-2018-6594 [HIGH] CWE-326 CVE-2018-6594: lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, whi
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementati
ghsanvdosv
CVE-2013-7459CRITICALCVSS 9.8≤ 2.6.12017-02-15
CVE-2013-7459 [CRITICAL] CWE-119 CVE-2013-7459: Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
ghsanvdosv
CVE-2013-1445MEDIUMCVSS 4.3≤ 2.6v1.0.0+10 more2013-10-26
CVE-2013-1445 [MEDIUM] CWE-310 CVE-2013-1445: The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-rando
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within
ghsanvdosv
CVE-2012-2417MEDIUMCVSS 4.3≤ 2.5v1.0.0+11 more2012-06-17
CVE-2012-2417 [MEDIUM] CWE-310 CVE-2012-2417: PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to gener
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
ghsanvdosv