CVE-2020-13757

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
Configurations

Configuration 1 (hide)

cpe:2.3:a:python-rsa_project:python-rsa:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://github.com/sybrenstuvel/python-rsa/issues/146 - Issue Tracking, Third Party Advisory () https://github.com/sybrenstuvel/python-rsa/issues/146 - Issue Tracking, Third Party Advisory
References () https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/ -
References () https://usn.ubuntu.com/4478-1/ - Third Party Advisory () https://usn.ubuntu.com/4478-1/ - Third Party Advisory

07 Nov 2023, 03:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/', 'name': 'FEDORA-2020-5ed5627d2b', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/', 'name': 'FEDORA-2020-253ebe55ff', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/ -

Information

Published : 2020-06-01 19:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13757

Mitre link : CVE-2020-13757

CVE.ORG link : CVE-2020-13757


JSON object : View

Products Affected

canonical

  • ubuntu_linux

fedoraproject

  • fedora

python-rsa_project

  • python-rsa
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm