Lucene search

K
nodejsUnknownNODEJS:134
HistoryJul 27, 2016 - 12:24 a.m.

Timing Attack

2016-07-2700:24:38
unknown
www.npmjs.com
13

0.002 Low

EPSS

Percentile

62.1%

Overview

Affected versions of cookie-signature are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.

Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.

Under favorable network conditions, an attacker can exploit this to guess the secret in no more than charset*length guesses, instead of charset^length guesses required were the timing attack not present.

Recommendation

Update to 1.0.6 or later.

References

CPENameOperatorVersion
cookie-signaturele1.0.5

0.002 Low

EPSS

Percentile

62.1%