4.3
CVSSv2

CVE-2012-2417

Published: 17/06/2012 Updated: 29/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

PyCrypto prior to 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for malicious users to conduct brute force attacks to obtain the private key.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlitz pycrypto 2.4

dlitz pycrypto 2.3

dlitz pycrypto 1.9

dlitz pycrypto 1.0.1

dlitz pycrypto 1.0.0

dlitz pycrypto

dlitz pycrypto 2.4.1

dlitz pycrypto 2.0.1

dlitz pycrypto 2.0

dlitz pycrypto 1.1

dlitz pycrypto 1.0.2

dlitz pycrypto 2.1.0

dlitz pycrypto 2.2

Vendor Advisories

PyCrypto improperly created ElGamal encryption keys ...
It was discovered that that the ElGamal code in PythonCrypto, a collection of cryptographic algorithms and protocols for Python used insecure insufficient prime numbers in key generation, which lead to a weakened signature or public key space, allowing easier brute force attacks on such keys For the stable distribution (squeeze), this problem has ...
PyCrypto before 26 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key ...