Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-766-1 | libcrypto++ security update |
Debian DSA |
DSA-3748-1 | libcrypto++ security update |
EUVD |
EUVD-2016-10726 | Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:07:31.216Z
Reserved: 2016-12-12T00:00:00
Link: CVE-2016-9939
No data.
Status : Deferred
Published: 2017-01-30T21:59:01.207
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-9939
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD