ID CVE-2012-2417
Summary PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
References
Vulnerable Configurations
  • cpe:2.3:a:dlitz:pycrypto:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.1:alpha2:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.1:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha1:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha2:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha3:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha3:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha4:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha4:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha5:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha5:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:1.9:alpha6:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:1.9:alpha6:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha2:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.1.0:alpha2:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.1.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.1.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:dlitz:pycrypto:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:dlitz:pycrypto:2.5:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 29-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
bid 53687
confirm https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog
debian DSA-2502
fedora
  • FEDORA-2012-8392
  • FEDORA-2012-8470
  • FEDORA-2012-8490
mandriva MDVSA-2012:117
misc
mlist [oss-security] 20120524 CVE-2012-2417 - PyCrypto <= 2.5 insecure ElGamal key generation
osvdb 82279
secunia 49263
suse openSUSE-SU-2012:0830
xf pycrypto-keys-weak-security(75871)
Last major update 29-08-2017 - 01:31
Published 17-06-2012 - 03:41
Last modified 29-08-2017 - 01:31
Back to Top