CVE-2013-7459: Buffer Overflow in pycrypto
(updated )
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
References
- bugzilla.redhat.com/show_bug.cgi?id=1409754
- github.com/advisories/GHSA-cq27-v7xp-c356
- github.com/dlitz/pycrypto
- github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
- github.com/dlitz/pycrypto/issues/176
- github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2017-94.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE
- nvd.nist.gov/vuln/detail/CVE-2013-7459
- security.gentoo.org/glsa/201702-14
Detect and mitigate CVE-2013-7459 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →