4.3
CVSSv2

CVE-2013-1445

Published: 26/10/2013 Updated: 28/10/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The Crypto.Random.atfork function in PyCrypto prior to 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent malicious users to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.

Vulnerable Product Search on Vulmon Subscribe to Product

dlitz pycrypto

dlitz pycrypto 2.1.0

dlitz pycrypto 2.0.1

dlitz pycrypto 2.0

dlitz pycrypto 2.3

dlitz pycrypto 2.4.1

dlitz pycrypto 1.0.1

dlitz pycrypto 2.2

dlitz pycrypto 2.4

dlitz pycrypto 2.5

dlitz pycrypto 1.0.2

dlitz pycrypto 1.0.0

Vendor Advisories

The CryptoRandomatfork function in PyCrypto before 261 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG wit ...
The CryptoRandomatfork function in PyCrypto before 261 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG wit ...

Github Repositories

Blockchain E-Voting System

Blockchain E-Voting System [1][2] Demo Overview Blockchain voting system was designed as a di