A heap-buffer overflow vulnerability was discovered in pycrypto leading to arbitrary code execution. All users of pycrypto's AES module that allow the mode of operation to be specified by an attacker, check for ECB explicitly and create the objects without specifying an IV are vulnerable to this issue.
This is CVE-2013-7459.
Please login to add feedback.
This update has been submitted for testing by pghmcfc.
This update has been pushed to testing.
This update has been submitted for stable by pghmcfc.
This update has been pushed to stable.
Hi, this breaks package python-paramiko on EPEL, see: https://bugzilla.redhat.com/show_bug.cgi?id=1419312
A possible (nice) solution - as was done in fc24, is to build and provide python-paramiko2.x in EPEL, which does not depend on python2-crypto(instead it depends on python2-cryptography, which is supposed to be more secure and maintained).
The issue is fixed in python-paramiko-1.16.1-2.el7, which is currently in updates-testing.