Lucene search

K
CryptoppCrypto++

6 matches found

CVE
CVE
added 2019/07/30 5:15 p.m.109 views

CVE-2019-14318

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (p...

5.9CVSS5.7AI score0.02374EPSS
CVE
CVE
added 2017/06/05 2:29 p.m.84 views

CVE-2017-9434

Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.

5.3CVSS5.3AI score0.00472EPSS
CVE
CVE
added 2021/09/06 7:15 p.m.58 views

CVE-2021-40530

The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephem...

5.9CVSS5.4AI score0.00257EPSS
CVE
CVE
added 2016/09/16 5:59 a.m.39 views

CVE-2016-7420

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory af...

5.9CVSS6.1AI score0.00584EPSS
CVE
CVE
added 2021/11/04 9:15 p.m.39 views

CVE-2021-43398

Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: th...

5.3CVSS5.1AI score0.00502EPSS
CVE
CVE
added 2023/12/18 4:15 a.m.27 views

CVE-2023-50979

Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.

5.9CVSS5.7AI score0.00101EPSS