
We found results for “”
CVE-2016-7420
Good to know:

Date: September 15, 2016
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
Language: C++
Severity Score
Related Resources (9)
Severity Score
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
CWE-200Top Fix

Upgrade Version
Upgrade to version cryptopp.v120.windesktop.msvcstl.dyn.rt-dyn-x64 - 5.6.2.2;crypto++ - 5.6.5-2;libcrypto.UWP - no_fix;cryptopp - 5.6.5.1;cryptopp.v120.windesktop.msvcstl.dyn.rt-dyn-Win32 - 5.6.2.2;cryptopp.v140.windesktop.msvcstl.dyn.rt-dyn-Win32 - 5.6.2.2;cryptopp.v140.windesktop.msvcstl.dyn.rt-dyn-x64 - 5.6.2.2;cryptopp.v120.windesktop.msvcstl.dyn.rt-static-Win32 - 5.6.2.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |