Описание
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.4.2-1 |
| cosmic | not-affected | 0.4.2-1 |
| devel | not-affected | 0.4.2-1 |
| disco | not-affected | 0.4.2-1 |
| eoan | not-affected | 0.4.2-1 |
| esm-apps/bionic | not-affected | 0.4.2-1 |
| esm-apps/focal | not-affected | 0.4.2-1 |
| esm-apps/jammy | not-affected | 0.4.2-1 |
| esm-apps/noble | not-affected | 0.4.2-1 |
Показывать по
4.3 Medium
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in ...
jwcrypto lacks the Random Filling protection mechanism
4.3 Medium
CVSS2
5.3 Medium
CVSS3