Description
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
http://www.securityfocus.com/bid/92988
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2016/09/16/1
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2016/09/15/12
Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2023/09/28/2
Mailing List mailing-list
http://www.openwall.com/lists/oss-security/2023/09/28/4
Issue Tracking, Patch, Third Party Advisory
https://github.com/weidai11/cryptopp/commit/553049ba297d89d9e8fbf2204acb40a8a53f5cd6
Issue Tracking, Patch, Third Party Advisory
https://github.com/weidai11/cryptopp/issues/277
Scores
CVSS v3
5.9
EPSS
0.0038
EPSS Percentile
59.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-200
Status
published
Products (1)
cryptopp/crypto\+\+
< 5.6.4
Published
Sep 16, 2016
Tracked Since
Feb 18, 2026