Show filters
108 Total Results
Displaying 81-90 of 108
Sort by:
Attacker Value
Unknown
CVE-2017-9434
Disclosure Date: June 05, 2017 (last updated November 08, 2023)
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
0
Attacker Value
Unknown
CVE-2017-3204
Disclosure Date: April 04, 2017 (last updated November 26, 2024)
The Go SSH library (x/crypto/ssh) by default does not verify host keys, facilitating man-in-the-middle attacks. Default behavior changed in commit e4e2799 to require explicitly registering a hostkey verification mechanism.
0
Attacker Value
Unknown
CVE-2013-7459
Disclosure Date: February 15, 2017 (last updated November 08, 2023)
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
0
Attacker Value
Unknown
CVE-2016-3995
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
0
Attacker Value
Unknown
CVE-2016-8217
Disclosure Date: February 03, 2017 (last updated November 25, 2024)
EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
0
Attacker Value
Unknown
CVE-2016-8212
Disclosure Date: February 03, 2017 (last updated November 25, 2024)
An issue was discovered in EMC RSA BSAFE Crypto-J versions prior to 6.2.2. There is an Improper OCSP Validation Vulnerability. OCSP responses have two time values: thisUpdate and nextUpdate. These specify a validity period; however, both values are optional. Crypto-J treats the lack of a nextUpdate as indicating that the OCSP response is valid indefinitely instead of restricting its validity for a brief period surrounding the thisUpdate time. This vulnerability is similar to the issue described in CVE-2015-4748.
0
Attacker Value
Unknown
CVE-2016-7544
Disclosure Date: January 30, 2017 (last updated November 25, 2024)
Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.
0
Attacker Value
Unknown
CVE-2016-9939
Disclosure Date: January 30, 2017 (last updated November 08, 2023)
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
0
Attacker Value
Unknown
CVE-2016-7420
Disclosure Date: September 16, 2016 (last updated November 25, 2024)
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
0
Attacker Value
Unknown
CVE-2016-6298
Disclosure Date: September 01, 2016 (last updated November 02, 2024)
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
0