Cryptopp Crypto vulnerabilities
12 known vulnerabilities affecting cryptopp/crypto.
Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH6MEDIUM6
Vulnerabilities
Page 1 of 1
CVE-2023-50980HIGHCVSS 7.5≤ 8.9.02023-12-18
CVE-2023-50980 [HIGH] CVE-2023-50980: gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (app
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
nvd
CVE-2023-50981HIGHCVSS 7.5≤ 8.9.02023-12-18
CVE-2023-50981 [HIGH] CWE-835 CVE-2023-50981: ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of ser
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
nvd
CVE-2023-50979MEDIUMCVSS 5.9≤ 8.9.02023-12-18
CVE-2023-50979 [MEDIUM] CWE-203 CVE-2023-50979: Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 p
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
nvd
CVE-2022-48570HIGHCVSS 7.5≤ 8.4.02023-08-22
CVE-2022-48570 [HIGH] CVE-2022-48570: Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSiz
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.
nvd
CVE-2021-43398MEDIUMCVSS 5.3≤ 8.6.02021-11-04
CVE-2021-43398 [MEDIUM] CWE-203 CVE-2021-43398: Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a c
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple thi
nvd
CVE-2021-40530MEDIUMCVSS 5.9≤ 8.52021-09-06
CVE-2021-40530 [MEDIUM] CWE-327 CVE-2021-40530: The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interac
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration att
nvd
CVE-2019-14318MEDIUMCVSS 5.9≤ 8.3.02019-07-30
CVE-2019-14318 [MEDIUM] CWE-417 CVE-2019-14318: Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (b
nvd
CVE-2017-9434MEDIUMCVSS 5.3≤ 5.6.42017-06-05
CVE-2017-9434 [MEDIUM] CWE-125 CVE-2017-9434: Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp i
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
nvd
CVE-2016-3995HIGHCVSS 7.5≤ 5.6.32017-02-13
CVE-2016-3995 [HIGH] CWE-200 CVE-2016-3995: The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBl
The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
nvd
CVE-2016-9939HIGHCVSS 7.5v5.6.42017-01-30
CVE-2016-9939 [HIGH] CWE-20 CVE-2016-9939: Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay
nvd
CVE-2016-7544HIGHCVSS 7.5v5.6.42017-01-30
CVE-2016-7544 [HIGH] CWE-399 CVE-2016-7544: Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library w
Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.
nvd
CVE-2016-7420MEDIUMCVSS 5.9≤ 5.6.42016-09-16
CVE-2016-7420 [MEDIUM] CWE-200 CVE-2016-7420: Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG de
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a
nvd