CVE-2016-3995

Published on: 02/13/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Certain versions of Crypto from Cryptopp contain the following vulnerability:

The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.

  • CVE-2016-3995 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Crypto++ CVE-2016-3995 Information Disclosure Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 85975
Timing Attack Counter Measure AES · Issue #146 · weidai11/cryptopp · GitHub Issue Tracking
Patch
Third Party Advisory
github.com
text/html
URL Logo CONFIRM github.com/weidai11/cryptopp/issues/146
oss-security - Re: CVE request: libcrypto++ - Timing Attack Counter Measure Mailing List
Patch
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160411 Re: CVE request: libcrypto++ - Timing Attack Counter Measure

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationCryptoppCrypto AllAllAllAll
  • cpe:2.3:a:cryptopp:crypto\+\+:*:*:*:*:*:*:*:*: