First published: Thu Sep 01 2016(Updated: )
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/jwcrypto | <0.3.2 | 0.3.2 |
jwcrypto | <=0.3.1 | |
jwcrypto | <0.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6298 is classified as a high severity vulnerability due to the potential for remote attackers to perform a Million Message Attack.
To mitigate CVE-2016-6298, update jwcrypto to version 0.3.2 or later.
CVE-2016-6298 affects all versions of jwcrypto prior to 0.3.2.
CVE-2016-6298 exploits the lack of Random Filling protection in the RSA 1.5 algorithm implementation.
CVE-2016-6298 increases the risk of remote attackers being able to access cleartext data.