Vulnerabilities > CVE-2012-3458 - Cryptographic Issues vulnerability in Python Beaker
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode, which might allow remote attackers to obtain portions of sensitive session data via unspecified vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-2541.NASL |
description | It was discovered that Beaker, a cache and session library for Python, when using the python-crypto backend, is vulnerable to information disclosure due to a cryptographic weakness related to the use of the AES cipher in ECB mode. Systems that have the python-pycryptopp package should not be vulnerable, as this backend is preferred over python-crypto. After applying this update, existing sessions will be invalidated. |
last seen | 2020-03-17 |
modified | 2012-09-10 |
plugin id | 62012 |
published | 2012-09-10 |
reporter | This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/62012 |
title | Debian DSA-2541-1 : beaker - information disclosure |
code |
|
References
- http://www.debian.org/security/2012/dsa-2541
- http://secunia.com/advisories/50520
- http://www.openwall.com/lists/oss-security/2012/08/13/10
- https://github.com/bbangert/beaker/commit/91becae76101cf87ce8cbfabe3af2622fc328fe5
- http://secunia.com/advisories/50226
- https://bugzilla.redhat.com/show_bug.cgi?id=809267