PyCrypto uses weak ElGamal cryptography. Due to an incorrect implementation of ElGamal, the Decisional Diffie-Hellman (DDH) assumption doesn’t hold because of the way the key parameters are generated. This allows attackers who have access to the cipher-text to decrypt the messages and potentially gain access to sensitive information.
CPE | Name | Operator | Version |
---|---|---|---|
pycrypto | le | 2.6.1 | |
python-crypto:buster | eq | 2.6.1-9+b1 |
github.com/dlitz/pycrypto/issues/253
github.com/Legrandin/pycryptodome/issues/90
github.com/TElgamal
github.com/TElgamal/attack-on-pycrypto-elgamal
github.com/weikengchen
lists.debian.org/debian-lts-announce/2018/02/msg00018.html
security.gentoo.org/glsa/202007-62
usn.ubuntu.com/3616-1/
usn.ubuntu.com/3616-2/