First published: Sun Jun 17 2012(Updated: )
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlitz Pycrypto | <=2.5 | |
Dlitz Pycrypto | =1.0.0 | |
Dlitz Pycrypto | =1.0.1 | |
Dlitz Pycrypto | =1.0.2 | |
Dlitz Pycrypto | =1.1-alpha2 | |
Dlitz Pycrypto | =1.9-alpha1 | |
Dlitz Pycrypto | =1.9-alpha2 | |
Dlitz Pycrypto | =1.9-alpha3 | |
Dlitz Pycrypto | =1.9-alpha4 | |
Dlitz Pycrypto | =1.9-alpha5 | |
Dlitz Pycrypto | =1.9-alpha6 | |
Dlitz Pycrypto | =2.0 | |
Dlitz Pycrypto | =2.0.1 | |
Dlitz Pycrypto | =2.1.0 | |
Dlitz Pycrypto | =2.1.0-alpha1 | |
Dlitz Pycrypto | =2.1.0-alpha2 | |
Dlitz Pycrypto | =2.1.0-beta1 | |
Dlitz Pycrypto | =2.2 | |
Dlitz Pycrypto | =2.3 | |
Dlitz Pycrypto | =2.4 | |
Dlitz Pycrypto | =2.4.1 | |
pip/PyCrypto | <2.6 | 2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.