CVE-2016-7420
Published: 16 September 2016
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
Notes
Author | Note |
---|---|
ratliff | precise, trusty, xenial, yakkety all build using -NDEBUG |
msalvatore | I'm retiring this CVE and marking each release as "ignored". I've confirmed ratliff's above comment. In addition, the fix for this CVE is simply an update to the documentation. |
Priority
Status
Package | Release | Status |
---|---|---|
libcrypto++ Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Ignored
(compiled with -NDEBUG)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Ignored
(compiled with -NDEBUG)
|
|
upstream |
Released
(5.6.5)
|
|
xenial |
Ignored
(compiled with -NDEBUG)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
- https://github.com/weidai11/cryptopp/issues/277
- http://www.openwall.com/lists/oss-security/2016/09/15/12
- http://www.openwall.com/lists/oss-security/2016/09/16/1
- https://github.com/weidai11/cryptopp/commit/553049ba297d89d9e8fbf2204acb40a8a53f5cd6
- https://www.cve.org/CVERecord?id=CVE-2016-7420
- NVD
- Launchpad
- Debian