Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-766-1 libcrypto++ security update
Debian DSA Debian DSA DSA-3748-1 libcrypto++ security update
EUVD EUVD EUVD-2016-10726 Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:07:31.216Z

Reserved: 2016-12-12T00:00:00

Link: CVE-2016-9939

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-01-30T21:59:01.207

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-9939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.