Vulnerabilities > Botan Project > Botan > 1.11.33

DATE CVE VULNERABILITY TITLE RISK
2023-11-03 CVE-2017-7252 Cleartext Transmission of Sensitive Information vulnerability in Botan Project Botan
bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password.
network
low complexity
botan-project CWE-319
7.5
2021-09-06 CVE-2021-40529 Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products
The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
network
high complexity
botan-project fedoraproject mozilla CWE-327
5.9
2021-02-22 CVE-2021-24115 Unspecified vulnerability in Botan Project Botan
In Botan before 2.17.3, constant-time computations are not used for certain decoding and encoding operations (base32, base58, base64, and hex).
network
low complexity
botan-project
7.5
2019-03-08 CVE-2018-20187 Key Management Errors vulnerability in Botan Project Botan
A side-channel issue was discovered in Botan before 2.9.0.
4.3
2018-04-12 CVE-2018-9860 Off-by-one Error vulnerability in Botan Project Botan
An issue was discovered in Botan 1.11.32 through 2.x before 2.6.0.
network
low complexity
botan-project CWE-193
5.0
2017-09-26 CVE-2017-14737 A cryptographic cache-based side channel in the RSA implementation in Botan before 1.10.17, and 1.11.x and 2.x before 2.3.0, allows a local attacker to recover information about RSA secret keys, as demonstrated by CacheD.
local
low complexity
botan-project debian
2.1
2017-01-30 CVE-2016-9132 Integer Overflow or Wraparound vulnerability in Botan Project Botan
In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow could occur, which would cause an incorrect length field to be computed.
network
low complexity
botan-project CWE-190
critical
9.8