Description
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2502-1 | python-crypto security update |
EUVD |
EUVD-2012-0026 | PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key. |
Github GHSA |
GHSA-v367-p58w-98h5 | PyCrypto makes Use of Insufficiently Random Values |
Ubuntu USN |
USN-1484-1 | PyCrypto vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T19:34:25.430Z
Reserved: 2012-04-24T00:00:00.000Z
Link: CVE-2012-2417
No data.
Status : Deferred
Published: 2012-06-17T03:41:40.763
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-2417
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA
Ubuntu USN