The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92729 | Broken Link Third Party Advisory VDB Entry |
https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba | Issue Tracking Patch Vendor Advisory |
https://github.com/latchset/jwcrypto/issues/65 | Issue Tracking Vendor Advisory |
https://github.com/latchset/jwcrypto/pull/66 | Issue Tracking Patch |
https://github.com/latchset/jwcrypto/releases/tag/v0.3.2 | Patch Vendor Advisory |
Configurations
History
01 Nov 2024, 14:36
Type | Values Removed | Values Added |
---|---|---|
First Time |
Latchset
Latchset jwcrypto |
|
CPE | cpe:2.3:a:latchset:jwcrypto:*:*:*:*:*:*:*:* | |
References | () http://www.securityfocus.com/bid/92729 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2016-09-01 23:59
Updated : 2024-11-01 14:36
NVD link : CVE-2016-6298
Mitre link : CVE-2016-6298
CVE.ORG link : CVE-2016-6298
JSON object : View
Products Affected
latchset
- jwcrypto
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor