CVE-2024-28285
- EPSS 0.21%
- Veröffentlicht 14.05.2024 15:14:19
- Zuletzt bearbeitet 21.11.2024 09:06:08
A Fault Injection vulnerability in the SymmetricDecrypt function in cryptopp/elgamal.h of Cryptopp Crypto++ 8.9, allows an attacker to co-reside in the same system with a victim process to disclose information and escalate privileges.
CVE-2023-50980
- EPSS 0.1%
- Veröffentlicht 18.12.2023 04:15:51
- Zuletzt bearbeitet 21.11.2024 08:37:39
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
CVE-2023-50979
- EPSS 0.1%
- Veröffentlicht 18.12.2023 04:15:50
- Zuletzt bearbeitet 21.11.2024 08:37:38
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
CVE-2022-48570
- EPSS 0.52%
- Veröffentlicht 22.08.2023 19:16:32
- Zuletzt bearbeitet 21.11.2024 07:33:31
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because...
CVE-2021-43398
- EPSS 0.5%
- Veröffentlicht 04.11.2021 21:15:09
- Zuletzt bearbeitet 21.11.2024 06:29:09
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might al...
CVE-2021-40530
- EPSS 0.26%
- Veröffentlicht 06.09.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 06:24:20
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by ...
CVE-2019-14318
- EPSS 2.37%
- Veröffentlicht 30.07.2019 17:15:12
- Zuletzt bearbeitet 21.11.2024 04:26:29
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue o...