Описание
jwcrypto lacks the Random Filling protection mechanism
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-6298
- https://github.com/latchset/jwcrypto/issues/65
- https://github.com/latchset/jwcrypto/pull/66
- https://github.com/latchset/jwcrypto/commit/eb5be5bd94c8cae1d7f3ba9801377084d8e5a7ba
- https://github.com/latchset/jwcrypto/releases/tag/v0.3.2
- https://github.com/pypa/advisory-database/tree/main/vulns/jwcrypto/PYSEC-2016-4.yaml
- https://web.archive.org/web/20200227230613/http://www.securityfocus.com/bid/92729
Пакеты
jwcrypto
< 0.3.2
0.3.2
Связанные уязвимости
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in ...