CVE-2020-13757

Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
VendorProductVersion
python-rsa_projectpython-rsa
𝑥
< 4.1
canonicalubuntu_linux
14.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-rsa
bullseye
no-dsa
buster
no-dsa
stretch
no-dsa
jessie
no-dsa
bookworm
4.8-1
fixed
sid
4.9-2
fixed
trixie
4.9-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-rsa
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
ignored
hirsute
ignored
groovy
ignored
focal
Fixed 4.0-3ubuntu0.1~esm1
released
eoan
ignored
bionic
Fixed 3.4.2-1ubuntu0.1~esm1
released
xenial
Fixed 3.2.3-1.1ubuntu0.1~esm1
released
trusty
Fixed 3.1.2-1ubuntu0.1+esm1
released