Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7420

Опубликовано: 16 сент. 2016
Источник: debian
EPSS Низкий

Описание

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libcrypto++unfixedpackage

Примечания

  • https://github.com/weidai11/cryptopp/issues/277

  • The scope of this CVE is the documentation bug, lacking treatment of

  • -DNDEBUG and Static Initialization

  • Documentation added in https://github.com/weidai11/cryptopp/commit/553049ba297d89d9e8fbf2204acb40a8a53f5cd6

EPSS

Процентиль: 71%
0.00681
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

CVSS3: 5.9
nvd
больше 9 лет назад

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

CVSS3: 5.9
github
больше 3 лет назад

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

EPSS

Процентиль: 71%
0.00681
Низкий