4.3

CVE-2013-1445

Exploit

The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.

Data is provided by the National Vulnerability Database (NVD)
DlitzPycrypto Version <= 2.6
DlitzPycrypto Version1.0.0
DlitzPycrypto Version1.0.1
DlitzPycrypto Version1.0.2
DlitzPycrypto Version2.0
DlitzPycrypto Version2.0.1
DlitzPycrypto Version2.1.0
DlitzPycrypto Version2.2
DlitzPycrypto Version2.3
DlitzPycrypto Version2.4
DlitzPycrypto Version2.4.1
DlitzPycrypto Version2.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.42% 0.594
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:P/I:N/A:N