5
CVSSv2

CVE-2018-6594

Published: 03/02/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

lib/Crypto/PublicKey/ElGamal.py in PyCrypto up to and including 2.6.1 generates weak ElGamal key parameters, which allows malicious users to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.

Vulnerability Trend

Affected Products

Vendor Product Versions
DlitzPycrypto2.6.1
CanonicalUbuntu Linux12.04, 14.04, 16.04, 17.10
DebianDebian Linux7.0

Vendor Advisories

Python Crypto could expose sensitive information ...
Python Crypto could expose sensitive information ...
Debian Bug report logs - #889998 pycryptodome: CVE-2018-6594 Package: src:pycryptodome; Maintainer for src:pycryptodome is Debian Python Modules Team <python-modules-team@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 9 Feb 2018 21:00:02 UTC Severity: important Tags: fixed ...
Weak ElGamal key parameters in PublicKey/ElGamalpy allow attackers to obtain sensitive information by reading ciphertext:lib/Crypto/PublicKey/ElGamalpy in PyCrypto through 261 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (ie, it does not have semantic security in face ...
lib/Crypto/PublicKey/ElGamalpy in PyCrypto through 261 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (ie, it does not have semantic security in face of a ciphertext-only attack) The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal impleme ...

Github Repositories