GHSA-537h-rv9q-vvph

Suggest an improvement
Source
https://github.com/advisories/GHSA-537h-rv9q-vvph
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-537h-rv9q-vvph/GHSA-537h-rv9q-vvph.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-537h-rv9q-vvph
Aliases
Published
2021-03-24T18:24:39Z
Modified
2024-10-21T22:00:53.647822Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Python-RSA decryption of ciphertext leads to DoS
Details

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).

References

Affected packages

PyPI / rsa

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1

Affected versions

1.*

1.1
1.2
1.3
1.3.1
1.3.2
1.3.3

2.*

2.0

3.*

3.0
3.0.1
3.1
3.1.1
3.1.2
3.1.3
3.1.4
3.2
3.2.1
3.2.2
3.2.3
3.3
3.4
3.4.1
3.4.2

4.*

4.0