Lucene search

K
githubGitHub Advisory DatabaseGHSA-3494-CFWF-56HW
HistoryApr 28, 2024 - 12:30 a.m.

mdanter/ecc affected by timing vulnerability in cryptographic side-channels

2024-04-2800:30:22
GitHub Advisory Database
github.com
7
mdanter/ecc
timing vulnerability
cryptographic side-channels
phpecc
paragonie/ecc
branch-based timing leak
composer package
github
matyas danter ecc library
hard-forked
paragon initiative enterprises
upstream code
vulnerability
software

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

phpecc, as used in all versions of mdanter/ecc, as well as paragonie/ecc before 2.0.1, has a branch-based timing leak in Point addition. (This Composer package is also known as phpecc/phpecc on GitHub, previously known as the Matyas Danter ECC library.)

Paragon Initiative Enterprises hard-forked phpecc/phpecc and discovered the issue in the original code, then released v2.0.1 which fixes the vulnerability. The upstream code is no longer maintained and remains vulnerable for all versions.

Affected configurations

Vulners
Node
mdantereccRange1.0.0
OR
paragonieeccRange0
OR
paragonieeccRange<2.0.1

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%