Description
Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0168 | Python-RSA before 4.1 ignores leading '\\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation). |
Github GHSA |
GHSA-537h-rv9q-vvph | Python-RSA decryption of ciphertext leads to DoS |
Ubuntu USN |
USN-4478-1 | Python-RSA vulnerability |
Ubuntu USN |
USN-4478-2 | Python-RSA vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:25:16.505Z
Reserved: 2020-06-01T00:00:00.000Z
Link: CVE-2020-13757
No data.
Status : Modified
Published: 2020-06-01T19:15:10.067
Modified: 2024-11-21T05:01:47.397
Link: CVE-2020-13757
OpenCVE Enrichment
No data.
EUVD
Github GHSA
Ubuntu USN