First published: Tue Jan 03 2017(Updated: )
A heap-buffer overflow vulnerability was discovered in cryptopp. This vulnerability can be used to remotely gain access to shell. References: <a href="http://seclists.org/oss-sec/2016/q4/760">http://seclists.org/oss-sec/2016/q4/760</a> <a href="https://pony7.fr/ctf:public:32c3:cryptmsg">https://pony7.fr/ctf:public:32c3:cryptmsg</a> Upstream bug: <a href="https://github.com/dlitz/pycrypto/issues/176">https://github.com/dlitz/pycrypto/issues/176</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pycrypto | <=2.6.1 | |
SUSE Python-pycrypto | <=2.6.1 | |
Fedora | =24 | |
Fedora | =25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7459 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2013-7459, update the affected software to a version that is not vulnerable, such as upgrading pycrypto to a version later than 2.6.1.
CVE-2013-7459 affects pycrypto versions up to and including 2.6.1, as well as Fedora versions 24 and 25.
CVE-2013-7459 is a heap-buffer overflow vulnerability that can lead to remote shell access.
Yes, CVE-2013-7459 can be exploited remotely, potentially allowing attackers to gain unauthorized access.