CVE-2016-9939

EUVD-2016-10726
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
cryptoppcrypto\+\+
5.6.4
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcrypto++
bookworm
8.7.0+git220824-1
fixed
bullseye
8.4.0-1
fixed
sid
8.9.0-1.1
fixed
trixie
8.9.0-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcrypto++
artful
not-affected
bionic
not-affected
precise
ignored
trusty
Fixed 5.6.1-6+deb8u3build0.14.04.1
released
xenial
Fixed 5.6.1-9ubuntu0.1
released
yakkety
ignored
zesty
not-affected