Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6298

Опубликовано: 01 сент. 2016
Источник: debian

Описание

The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-jwcryptofixed0.3.2-1package

Примечания

  • https://github.com/latchset/jwcrypto/issues/65

  • https://github.com/latchset/jwcrypto/pull/66

  • https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba

  • Code moved around in git, for 0.3.2 it is in jwe.py

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 9 лет назад

The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).

CVSS3: 5.3
nvd
больше 9 лет назад

The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).

CVSS3: 5.3
github
больше 3 лет назад

jwcrypto lacks the Random Filling protection mechanism