The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
https://exchange.xforce.ibmcloud.com/vulnerabilities/83039
http://www.securityfocus.com/bid/58702
http://www.openwall.com/lists/oss-security/2013/03/26/2
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html
Published: 2020-01-28
Updated: 2020-02-04
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
Base Score: 8.7
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00279