Vulnerabilities (CVE)

Filtered by vendor Botan Project Subscribe
Filtered by product Botan
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-7252 1 Botan Project 1 Botan 2023-11-13 N/A 7.5 HIGH
bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.
CVE-2018-9860 1 Botan Project 1 Botan 2019-10-03 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Botan 1.11.32 through 2.x before 2.6.0. An off-by-one error when processing malformed TLS-CBC ciphertext could cause the receiving side to include in the HMAC computation exactly 64K bytes of data following the record buffer, aka an over-read. The MAC comparison will subsequently fail and the connection will be closed. This could be used for denial of service. No information leak occurs.
CVE-2016-2194 2 Botan Project, Debian 2 Botan, Debian Linux 2017-07-01 5.0 MEDIUM 7.5 HIGH
The ressol function in Botan before 1.10.11 and 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (infinite loop) via unspecified input to the OS2ECP function, related to a composite modulus.
CVE-2016-2849 3 Botan Project, Debian, Fedoraproject 3 Botan, Debian Linux, Fedora 2017-07-01 5.0 MEDIUM 7.5 HIGH
Botan before 1.10.13 and 1.11.x before 1.11.29 do not use a constant-time algorithm to perform a modular inverse on the signature nonce k, which might allow remote attackers to obtain ECDSA secret keys via a timing side-channel attack.
CVE-2016-2850 2 Botan Project, Fedoraproject 2 Botan, Fedora 2017-07-01 5.0 MEDIUM 7.5 HIGH
Botan 1.11.x before 1.11.29 does not enforce TLS policy for (1) signature algorithms and (2) ECC curves, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
CVE-2016-6879 1 Botan Project 1 Botan 2017-04-15 5.0 MEDIUM 7.5 HIGH
The X509_Certificate::allowed_usage function in botan 1.11.x before 1.11.31 might allow attackers to have unspecified impact by leveraging a call with more than one Key_Usage set in the enum value.
CVE-2015-7824 1 Botan Project 1 Botan 2017-04-15 5.0 MEDIUM 7.5 HIGH
botan 1.11.x before 1.11.22 makes it easier for remote attackers to decrypt TLS ciphertext data via a padding-oracle attack against TLS CBC ciphersuites.
CVE-2015-7825 1 Botan Project 1 Botan 2017-04-15 7.8 HIGH 7.5 HIGH
botan before 1.11.22 improperly validates certificate paths, which allows remote attackers to cause a denial of service (infinite loop and memory consumption) via a certificate with a loop in the certificate chain.
CVE-2015-7827 3 Botan Project, Debian, Fedoraproject 3 Botan, Debian Linux, Fedora 2016-06-09 5.0 MEDIUM 7.5 HIGH
Botan before 1.10.13 and 1.11.x before 1.11.22 make it easier for remote attackers to conduct million-message attacks by measuring time differences, related to decoding of PKCS#1 padding.
CVE-2015-5726 2 Botan Project, Debian 2 Botan, Debian Linux 2016-05-16 5.0 MEDIUM 7.5 HIGH
The BER decoder in Botan 0.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (application crash) via an empty BIT STRING in ASN.1 data.
CVE-2014-9742 1 Botan Project 1 Botan 2016-05-16 5.0 MEDIUM 7.5 HIGH
The Miller-Rabin primality check in Botan before 1.10.8 and 1.11.x before 1.11.9 improperly uses a single random base, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a DH group.
CVE-2015-5727 2 Botan Project, Debian 2 Botan, Debian Linux 2016-05-13 7.8 HIGH 7.5 HIGH
The BER decoder in Botan 1.10.x before 1.10.10 and 1.11.x before 1.11.19 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, related to a length field.