Cryptopp

Crypto++

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.21%
  • Veröffentlicht 14.05.2024 15:14:19
  • Zuletzt bearbeitet 21.11.2024 09:06:08

A Fault Injection vulnerability in the SymmetricDecrypt function in cryptopp/elgamal.h of Cryptopp Crypto++ 8.9, allows an attacker to co-reside in the same system with a victim process to disclose information and escalate privileges.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 18.12.2023 04:15:51
  • Zuletzt bearbeitet 21.11.2024 08:37:39

gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 18.12.2023 04:15:50
  • Zuletzt bearbeitet 21.11.2024 08:37:38

Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.

Exploit
  • EPSS 0.52%
  • Veröffentlicht 22.08.2023 19:16:32
  • Zuletzt bearbeitet 21.11.2024 07:33:31

Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 04.11.2021 21:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:09

Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might al...

Exploit
  • EPSS 0.26%
  • Veröffentlicht 06.09.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:24:20

The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by ...

Exploit
  • EPSS 2.37%
  • Veröffentlicht 30.07.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:26:29

Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue o...