CVE-2013-1445
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
26/10/2013
Last modified:
11/04/2025
Description
The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dlitz:pycrypto:*:*:*:*:*:*:*:* | 2.6 (including) | |
cpe:2.3:a:dlitz:pycrypto:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:dlitz:pycrypto:2.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2013/dsa-2781
- http://www.openwall.com/lists/oss-security/2013/10/17/3
- https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175
- http://www.debian.org/security/2013/dsa-2781
- http://www.openwall.com/lists/oss-security/2013/10/17/3
- https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175