CVE-2018-6594

lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
VendorProductVersion
dlitzpycrypto
𝑥
≤ 2.6.1
debiandebian_linux
7.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pycryptodome
bullseye
3.9.7+dfsg1-1
fixed
stretch
no-dsa
jessie
no-dsa
wheezy
no-dsa
bookworm
3.11.0+dfsg1-4
fixed
sid
3.20.0+dfsg-3
fixed
trixie
3.20.0+dfsg-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pycryptodome
bionic
Fixed 3.4.7-1ubuntu1
released
artful
ignored
xenial
dne
trusty
dne
python-crypto
bionic
Fixed 2.6.1-8ubuntu2
released
artful
Fixed 2.6.1-7ubuntu0.1
released
xenial
Fixed 2.6.1-6ubuntu0.16.04.3
released
trusty
Fixed 2.6.1-4ubuntu0.3
released