Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-1445


The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.


Published

2013-10-26T17:55:03.027

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application dlitz pycrypto ≤ 2.6 Yes
Application dlitz pycrypto 1.0.0 Yes
Application dlitz pycrypto 1.0.1 Yes
Application dlitz pycrypto 1.0.2 Yes
Application dlitz pycrypto 2.0 Yes
Application dlitz pycrypto 2.0.1 Yes
Application dlitz pycrypto 2.1.0 Yes
Application dlitz pycrypto 2.2 Yes
Application dlitz pycrypto 2.3 Yes
Application dlitz pycrypto 2.4 Yes
Application dlitz pycrypto 2.4.1 Yes
Application dlitz pycrypto 2.5 Yes

References