CVE-2018-10903

EUVD-2018-0030
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
Affected Products (NVD)
VendorProductVersion
cryptographypython-cryptography
1.9.0 ≤
𝑥
< 2.3
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-cryptography
bookworm
38.0.4-3
fixed
bookworm (security)
38.0.4-3~deb12u1
fixed
bullseye
3.3.2-1
fixed
bullseye (security)
3.3.2-1+deb11u1
fixed
jessie
not-affected
sid
43.0.0-1
fixed
stretch
not-affected
trixie
43.0.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-cryptography
artful
ignored
bionic
Fixed 2.1.4-1ubuntu1.2
released
trusty
dne
xenial
not-affected