Vulnerability Description
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aescrypt Project | Aescrypt | <= 1.0.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/98035
- https://github.com/Gurpartap/aescrypt/issues/4Third Party Advisory
- http://www.securityfocus.com/bid/98035
- https://github.com/Gurpartap/aescrypt/issues/4Third Party Advisory
FAQ
What is CVE-2013-7463?
CVE-2013-7463 is a vulnerability with a CVSS score of 7.5 (HIGH). The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via...
How severe is CVE-2013-7463?
CVE-2013-7463 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7463?
Check the references section above for vendor advisories and patch information. Affected products include: Aescrypt Project Aescrypt.