First published: Tue Jan 28 2020(Updated: )
The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/py-bcrypt | <0.3 | 0.3 |
Python py-bcrypt | <0.3 | |
Fedora | =17 | |
Fedora | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1895 has a medium severity due to its potential to allow attackers to bypass authentication.
To fix CVE-2013-1895, upgrade the py-bcrypt module to version 0.3 or later.
CVE-2013-1895 affects all versions of py-bcrypt prior to 0.3.
Yes, CVE-2013-1895 can lead to unauthorized access through multiple concurrent authentication requests.
CVE-2013-1895 impacts systems using py-bcrypt versions below 0.3, including specific Fedora releases.