lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Link | Tags |
---|---|
https://github.com/TElgamal/attack-on-pycrypto-elgamal | third party advisory |
https://usn.ubuntu.com/3616-1/ | third party advisory vendor advisory |
https://github.com/dlitz/pycrypto/issues/253 | issue tracking exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html | third party advisory mailing list |
https://usn.ubuntu.com/3616-2/ | third party advisory vendor advisory |
https://security.gentoo.org/glsa/202007-62 | vendor advisory |