Vulnerability CVE-2012-2417


Published: 2012-06-16   Modified: 2012-06-17

Description:
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Dlitz -> Pycrypto 

 References:
https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2
https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog
https://bugs.launchpad.net/pycrypto/+bug/985164
http://xforce.iss.net/xforce/xfdb/75871
http://www.securityfocus.com/bid/53687
http://www.osvdb.org/82279
http://www.openwall.com/lists/oss-security/2012/05/25/1
http://secunia.com/advisories/49263
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html

Copyright 2024, cxsecurity.com

 

Back to Top