First published: Wed Jan 13 2016(Updated: )
The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/rsa | <3.3 | 3.3 |
python3-rsa | <3.3 | |
Fedora | =22 | |
Fedora | =23 | |
SUSE Linux | =42.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1494 has a moderate severity rating due to its potential to allow spoofing of signatures.
To fix CVE-2016-1494, upgrade the RSA package for Python to version 3.3 or later.
CVE-2016-1494 affects all versions of the RSA package prior to 3.3.
CVE-2016-1494 is associated with a crafted signature padding attack, known as a BERserk attack.
Software packages vulnerable to CVE-2016-1494 include Python-RSA versions before 3.3, Fedora versions 22 and 23, and openSUSE versions 13.1, 13.2, and 42.1.