CVE-2016-9939

Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the wipe for a large allocation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
cryptoppcrypto\+\+
5.6.4
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libcrypto++
bullseye
8.4.0-1
fixed
bookworm
8.7.0+git220824-1
fixed
sid
8.9.0-1.1
fixed
trixie
8.9.0-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libcrypto++
bionic
not-affected
artful
not-affected
zesty
not-affected
yakkety
ignored
xenial
Fixed 5.6.1-9ubuntu0.1
released
trusty
Fixed 5.6.1-6+deb8u3build0.14.04.1
released
precise
ignored