CVE-2018-6594

Source
https://cve.org/CVERecord?id=CVE-2018-6594
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6594.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-6594
Aliases
Downstream
Related
Published
2018-02-03T15:29:00.653Z
Modified
2026-03-15T22:26:31.042764Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.

References

Affected packages

Git / github.com/dlitz/pycrypto

Affected ranges

Type
GIT
Repo
https://github.com/dlitz/pycrypto
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.6.1"
        }
    ]
}

Affected versions

v1.*
v1.9a1
v1.9a2
v1.9a3
v1.9a4
v1.9a5
v2.*
v2.0.1
v2.1.0
v2.1.0alpha1
v2.1.0alpha2
v2.1.0b1
v2.2
v2.3
v2.4
v2.4.1
v2.5
v2.6
v2.6.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6594.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "7.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "12.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "14.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "16.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "17.10"
            }
        ]
    }
]