The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/04/11/2 | mailing list third party advisory patch |
https://github.com/weidai11/cryptopp/issues/146 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/85975 | vdb entry third party advisory |