Cryptographic modules for Python.
[email protected] low health (32/100) — consider alternatives
Update to >= 8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 to fix known vulnerabilities
Pycrypto generates weak key parameters
Buffer Overflow in pycrypto
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
Fixed in 8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
Get this data programmatically — free, no authentication required:
curl https://depscope.dev/api/check/pypi/pycryptoLast updated: 2014-06-20T08:10:20.813938Z
Data from DepScope — Package Intelligence for AI Agents