10
CVSSv2

CVE-2009-0544

Published: 12/02/2009 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length.

Vulnerable Product Search on Vulmon Subscribe to Product

pycrypto arc2 2.0.1

Vendor Advisories

Debian Bug report logs - #516660 Buffer overflow in the PyCrypto ARC2 modules Package: python-crypto; Maintainer for python-crypto is Sebastian Ramacher <sramacher@debianorg>; Source for python-crypto is src:python-crypto (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 22 Feb 2009 2 ...
Mike Wiacek discovered that the ARC2 implementation in Python Crypto did not correctly check the key length If a user or automated system were tricked into processing a malicious ARC2 stream, a remote attacker could execute arbitrary code or crash the application using Python Crypto, leading to a denial of service ...

Exploits

source: wwwsecurityfocuscom/bid/33674/info PyCrypto (Python Cryptography Toolkit) is prone to a buffer-overflow vulnerability because it fails to adequately verify user-supplied input Successful exploits may allow attackers to execute arbitrary code in the context of applications using the vulnerable module Failed attempts may lead to ...