rsa@3.3 vulnerabilities

Pure-Python RSA implementation

  • latest version

    4.9

  • latest non vulnerable version

  • first published

    16 years ago

  • latest version published

    2 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the rsa package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Timing Attack

    rsa is a pure-Python RSA implementation.

    Affected versions of this package are vulnerable to Timing Attack via timed processing of valid PKCS#1 v1.5 ciphertext. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw.

    How to fix Timing Attack?

    Upgrade rsa to version 4.7 or higher.

    [2.0,4.7)
    • M
    Access Restriction Bypass

    rsa is a pure-Python RSA implementation.

    Affected versions of this package are vulnerable to Access Restriction Bypass. It does not detect ciphertext modification during decryption (prepended "0" bytes) in PKCS1_v1_5.

    How to fix Access Restriction Bypass?

    Upgrade rsa to version 4.1 or higher.

    [0,4.1)
    • M
    Timing Attack

    rsa is a Pure-Python RSA implementation.

    Affected versions of this package are vulnerable to Timing attacks.

    [3.0,3.4.0)
    • H
    Authentication Bypass

    rsa is a Pure-Python RSA implementation.

    Affected versions of this package are vulnerable to Authentication Bypass due to not implementing authentication encryption or use MACs to validate messages before decrypting public key encrypted messages.

    [3.0,3.4)