Name: CVE-2009-0544 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544 Assigned: 20090212 Reference: MLIST:[oss-security] 20090207 CVE Request: pycrypto Reference: URL: http://www.openwall.com/lists/oss-security/2009/02/07/1 Reference: MLIST:[oss-security] 20090212 Re: CVE Request: pycrypto Reference: URL: http://www.openwall.com/lists/oss-security/2009/02/12/5 Reference: CONFIRM: http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=d1c4875e1f220652fe7ff8358f56dee3b2aba31b Reference: CONFIRM: http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=fd73731dfad451a81056fbb01e09aa78ab82eb5d Reference: BID:33674 Reference: URL: http://www.securityfocus.com/bid/33674 Reference: XF:pycrypto-arc2module-bo(48617) Reference: URL: http://xforce.iss.net/xforce/xfdb/48617 Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length. The patch is here: http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=d1c4875e1f220652fe7ff8358f56dee3b2aba31b
Created attachment 331731 [details] testcase Originally taken from http://downloads.securityfocus.com/vulnerabilities/exploits/SelfTest_Cipher_test_ARC2.py