The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0151 | The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten. |
Github GHSA |
GHSA-r838-q6jp-58xx | Improper Restriction of Excessive Authentication Attempts in py-bcrypt |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.112Z
Reserved: 2013-02-19T00:00:00
Link: CVE-2013-1895
No data.
Status : Modified
Published: 2020-01-28T15:15:14.343
Modified: 2024-11-21T01:50:36.283
Link: CVE-2013-1895
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA