
CVE-2023-50979
https://notcve.org/view.php?id=CVE-2023-50979
18 Dec 2023 — Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding. Crypto++ (también conocido como cryptopp) hasta 8.9.0 tiene un canal lateral de Marvin durante el descifrado con relleno PKCS#1 v1.5. • https://github.com/weidai11/cryptopp/issues/1247 • CWE-203: Observable Discrepancy •

CVE-2023-50980
https://notcve.org/view.php?id=CVE-2023-50980
18 Dec 2023 — gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing. gf2n.cpp en Crypto++ (también conocido como cryptopp) hasta la versión 8.9.0 permite a los atacantes provocar una denegación de servicio (caída de la aplicación) a través de datos de clave pública DER para una curva F(2^m), si el grado de cada término en el polinomio no es estr... • https://github.com/weidai11/cryptopp/issues/1248 •

CVE-2023-50981
https://notcve.org/view.php?id=CVE-2023-50981
18 Dec 2023 — ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853. ModularSquareRoot en Crypto++ (también conocido como cryptopp) hasta 8.9.0 permite a los atacantes provocar una denegación de servicio (bucle infinito) a través de datos de clave pública DER manipulada asociada con números impares al cuadrado, como el cuadrad... • https://github.com/weidai11/cryptopp/issues/1249 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2022-48570
https://notcve.org/view.php?id=CVE-2022-48570
22 Aug 2023 — Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons. • https://github.com/weidai11/cryptopp/issues/992 • CWE-787: Out-of-bounds Write •

CVE-2021-43398
https://notcve.org/view.php?id=CVE-2021-43398
04 Nov 2021 — Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. • https://cryptopp.com • CWE-203: Observable Discrepancy •

CVE-2021-40530
https://notcve.org/view.php?id=CVE-2021-40530
06 Sep 2021 — The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. Una implementación de ElGamal en Crypto++ versiones hasta 8.5, permite la recuperación de texto plano porque, durante la interacción entre d... • https://eprint.iacr.org/2021/923 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVE-2019-14318
https://notcve.org/view.php?id=CVE-2019-14318
30 Jul 2019 — Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field curves, large leakage) is not constant time and leaks the bit length of the scalar among other information. Crypto++ versión 8.3.0 y anterior, contie... • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00066.html • CWE-417: Communication Channel Errors •

CVE-2017-9434
https://notcve.org/view.php?id=CVE-2017-9434
05 Jun 2017 — Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter. Crypto ++ (conocido como cryptopp) hasta la versión 5.6.5, contiene una vulnerabilidad de lectura fuera de límites en el archivo zinflate.cpp en el filtro Inflator. • http://openwall.com/lists/oss-security/2017/06/06/2 • CWE-125: Out-of-bounds Read •

CVE-2016-3995
https://notcve.org/view.php?id=CVE-2016-3995
13 Feb 2017 — The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks. La protección de ataque de tiempo en Rijndael::Enc::ProcessAndXorBlock y Rijndael::Dec::ProcessAndXorBlock en Crypto ++ (también conocido como cryptopp) en versiones anteriores a 5.6.4 puede ser optimizado por el compilador, lo que permite a atacantes realizar ataques de tiempo. • http://www.openwall.com/lists/oss-security/2016/04/11/2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2016-7544
https://notcve.org/view.php?id=CVE-2016-7544
30 Jan 2017 — Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed. Crypto ++ 5.6.4 utiliza incorrectamente las funciones basadas en pila _malloca y _freea de Microsoft. La biblioteca solicitará un bloqueo de memoria para alinear una tabla en la memoria. • http://www.openwall.com/lists/oss-security/2016/09/23/5 • CWE-399: Resource Management Errors •