First published: Wed May 27 2020(Updated: )
A flaw was found in the python-rsa package, where it does not explicitly check the ciphertext length against the key size and ignores the leading 0 bytes during the decryption of the ciphertext. This flaw allows an attacker to perform a ciphertext attack, leading to a denial of service. The highest threat from this vulnerability is to confidentiality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-rsa | <0:4.5-2.el7 | 0:4.5-2.el7 |
redhat/python-rsa | <0:4.5-1.el7 | 0:4.5-1.el7 |
redhat/python-rsa | <4.1 | 4.1 |
debian/python-rsa | <=4.0-4 | 4.8-1 4.9-2 |
pip/rsa | <4.1 | 4.1 |
python3-rfc3339 | <4.1 | |
Red Hat Fedora | =31 | |
Red Hat Fedora | =32 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13757 has been classified as a high severity vulnerability due to the potential for denial of service attacks.
To fix CVE-2020-13757, upgrade the python-rsa package to version 4.1 or later.
Versions of python-rsa prior to 4.1 are affected by CVE-2020-13757.
Yes, CVE-2020-13757 can be exploited remotely, allowing attackers to execute ciphertext attacks.
CVE-2020-13757 can lead to denial of service on systems utilizing the vulnerable python-rsa package.