CVE-2020-36242

critical

Description

In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.

References

https://github.com/pyca/cryptography/issues/5615

https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst

https://github.com/pyca/cryptography/compare/3.3.1...3.3.2

https://lists.fedoraproject.org/archives/list/[email protected]/message/L7RGQLK4J5ZQFRLKCHVVG6BKZTUQMG7E/

https://www.oracle.com/security-alerts/cpuapr2022.html

Details

Source: MITRE

Published: 2021-02-07

Updated: 2022-05-12

Type: CWE-787

Risk Information

CVSS v2

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Impact Score: 5.2

Exploitability Score: 3.9

Severity: CRITICAL