Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
{
"github_reviewed": true,
"cwe_ids": [
"CWE-327"
],
"github_reviewed_at": "2021-03-24T18:24:28Z",
"nvd_published_at": "2020-06-01T19:15:00Z",
"severity": "HIGH"
}