Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown
CVE-2023-50981
Disclosure Date: December 18, 2023 (last updated December 28, 2023)
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
0
Attacker Value
Unknown
CVE-2023-50980
Disclosure Date: December 18, 2023 (last updated December 28, 2023)
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
0
Attacker Value
Unknown
CVE-2023-50979
Disclosure Date: December 18, 2023 (last updated December 28, 2023)
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
0
Attacker Value
Unknown
CVE-2022-48570
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.
0
Attacker Value
Unknown
CVE-2021-43398
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
0
Attacker Value
Unknown
CVE-2021-40530
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
0
Attacker Value
Unknown
CVE-2019-14318
Disclosure Date: July 30, 2019 (last updated November 27, 2024)
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information.
0
Attacker Value
Unknown
CVE-2017-9434
Disclosure Date: June 05, 2017 (last updated November 08, 2023)
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
0
Attacker Value
Unknown
CVE-2016-3995
Disclosure Date: February 13, 2017 (last updated November 26, 2024)
The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
0
Attacker Value
Unknown
CVE-2016-7544
Disclosure Date: January 30, 2017 (last updated November 25, 2024)
Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.
0