4.3

CVE-2013-1445

Exploit

The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DlitzPycrypto Version <= 2.6
DlitzPycrypto Version1.0.0
DlitzPycrypto Version1.0.1
DlitzPycrypto Version1.0.2
DlitzPycrypto Version2.0
DlitzPycrypto Version2.0.1
DlitzPycrypto Version2.1.0
DlitzPycrypto Version2.2
DlitzPycrypto Version2.3
DlitzPycrypto Version2.4
DlitzPycrypto Version2.4.1
DlitzPycrypto Version2.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.42% 0.594
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N