Lucene search

K
osvGoogleOSV:GHSA-3494-CFWF-56HW
HistoryApr 28, 2024 - 12:30 a.m.

mdanter/ecc affected by timing vulnerability in cryptographic side-channels

2024-04-2800:30:22
Google
osv.dev
24
mdanter/ecc
timing vulnerability
cryptographic side-channels
paragonie/ecc
php
composer package

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.0%

phpecc, as used in all versions of mdanter/ecc, as well as paragonie/ecc before 2.0.1, has a branch-based timing leak in Point addition. (This Composer package is also known as phpecc/phpecc on GitHub, previously known as the Matyas Danter ECC library.)

Paragon Initiative Enterprises hard-forked phpecc/phpecc and discovered the issue in the original code, then released v2.0.1 which fixes the vulnerability. The upstream code is no longer maintained and remains vulnerable for all versions.

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.0%