Description
Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Mike Wiacek · pythonremotelinux
https://www.exploit-db.com/exploits/32780
References (12)
Core 12
Core References
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2009:050
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48617
Various Sources x_refsource_confirm
http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git%3Ba=commitdiff%3Bh=d1c4875e1f220652fe7ff8358f56dee3b2aba31b
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2009:049
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/02/07/1
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35065
Various Sources x_refsource_confirm
http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git%3Ba=commitdiff%3Bh=fd73731dfad451a81056fbb01e09aa78ab82eb5d
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/34199
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/33674
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/02/12/5
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://www.gentoo.org/security/en/glsa/glsa-200903-11.xml
Scores
EPSS
0.2978
EPSS Percentile
96.7%
Details
CWE
CWE-119
Status
published
Products (1)
pycrypto/arc2
2.0.1
Published
Feb 12, 2009
Tracked Since
Feb 18, 2026