The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
References
Link | Resource |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html | Third Party Advisory Tool Signature |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83039 | Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/03/26/2 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/58702 | Third Party Advisory VDB Entry |
Information
Published : 2020-01-28 07:15
Updated : 2020-02-04 08:49
NVD link : CVE-2013-1895
Mitre link : CVE-2013-1895
JSON object : View
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
Products Affected
python
- py-bcrypt
fedoraproject
- fedora