PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html - | |
References | () http://secunia.com/advisories/49263 - Vendor Advisory | |
References | () http://www.debian.org/security/2012/dsa-2502 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:117 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/25/1 - | |
References | () http://www.osvdb.org/82279 - | |
References | () http://www.securityfocus.com/bid/53687 - | |
References | () https://bugs.launchpad.net/pycrypto/+bug/985164 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75871 - | |
References | () https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2 - Exploit, Patch | |
References | () https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog - | |
References | () https://hermes.opensuse.org/messages/15083589 - |
Information
Published : 2012-06-17 03:41
Updated : 2025-04-11 00:51
NVD link : CVE-2012-2417
Mitre link : CVE-2012-2417
CVE.ORG link : CVE-2012-2417
JSON object : View
Products Affected
dlitz
- pycrypto
CWE
CWE-310
Cryptographic Issues