LibTomCrypt 0.79

CPE Details

LibTomCrypt 0.79
0.79
2019-08-19
10h43 +00:00
2019-08-19
10h43 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:libtom:libtomcrypt:0.79:*:*:*:*:*:*:*

Informations

Vendor

libtom

Product

libtomcrypt

Version

0.79

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-17362 2019-10-08 22h00 +00:00 In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
9.1
Critical
CVE-2018-12437 2018-06-15 00h00 +00:00 LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
4.9
Medium
CVE-2016-6129 2017-02-13 17h00 +00:00 The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
7.5
High