Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
2020-06-01T19:15:10.067
2024-11-21T05:01:47.397
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | python-rsa_project | python-rsa | < 4.1 | Yes |
Operating System | fedoraproject | fedora | 31 | Yes |
Operating System | fedoraproject | fedora | 32 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |