Show filters
227 Total Results
Displaying 181-190 of 227
Sort by:
Attacker Value
Unknown

CVE-2017-9434

Disclosure Date: June 05, 2017 (last updated November 08, 2023)
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
0
Attacker Value
Unknown

CVE-2017-3204

Disclosure Date: April 04, 2017 (last updated November 26, 2024)
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
Attacker Value
Unknown

CVE-2016-9243

Disclosure Date: March 27, 2017 (last updated September 10, 2024)
HKDF in cryptography before 1.5.2 returns an empty byte-string if used with a length less than algorithm.digest_size.
Attacker Value
Unknown

CVE-2017-5682

Disclosure Date: February 28, 2017 (last updated November 26, 2024)
Intel PSET Application Install wrapper of Intel Parallel Studio XE, Intel System Studio, Intel VTune Amplifier, Intel Inspector, Intel Advisor, Intel MPI Library, Intel Trace Analyzer and Collector, Intel Integrated Performance Primitives, Cryptography for Intel Integrated Performance Primitives, Intel Math Kernel Library, Intel Data Analytics Acceleration Library, and Intel Threading Building Blocks before 2017 Update 2 allows an attacker to launch a process with escalated privileges.
0
Attacker Value
Unknown

CVE-2013-7459

Disclosure Date: February 15, 2017 (last updated November 08, 2023)
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
0
Attacker Value
Unknown

CVE-2016-3995

Disclosure Date: February 13, 2017 (last updated November 26, 2024)
The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
0
Attacker Value
Unknown

CVE-2016-8212

Disclosure Date: February 03, 2017 (last updated November 25, 2024)
An issue was discovered in EMC RSA BSAFE Crypto-J versions prior to 6.2.2. There is an Improper OCSP Validation Vulnerability. OCSP responses have two time values: thisUpdate and nextUpdate. These specify a validity period; however, both values are optional. Crypto-J treats the lack of a nextUpdate as indicating that the OCSP response is valid indefinitely instead of restricting its validity for a brief period surrounding the thisUpdate time. This vulnerability is similar to the issue described in CVE-2015-4748.
Attacker Value
Unknown

CVE-2016-8217

Disclosure Date: February 03, 2017 (last updated November 25, 2024)
EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
Attacker Value
Unknown

CVE-2016-7544

Disclosure Date: January 30, 2017 (last updated November 25, 2024)
Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.
0
Attacker Value
Unknown

CVE-2016-9939

Disclosure Date: January 30, 2017 (last updated November 08, 2023)
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
0