Skip to content

mdanter/ecc affected by timing vulnerability in cryptographic side-channels

Moderate severity GitHub Reviewed Published Apr 28, 2024 to the GitHub Advisory Database • Updated May 10, 2024

Package

composer mdanter/ecc (Composer)

Affected versions

<= 1.0.0

Patched versions

None
composer paragonie/ecc (Composer)
>= 0, < 2.0.1
2.0.1

Description

phpecc, as used in all versions of mdanter/ecc, as well as paragonie/ecc before 2.0.1, has a branch-based timing leak in Point addition. (This Composer package is also known as phpecc/phpecc on GitHub, previously known as the Matyas Danter ECC library.)

Paragon Initiative Enterprises hard-forked phpecc/phpecc and discovered the issue in the original code, then released v2.0.1 which fixes the vulnerability. The upstream code is no longer maintained and remains vulnerable for all versions.

References

Published by the National Vulnerability Database Apr 27, 2024
Published to the GitHub Advisory Database Apr 28, 2024
Reviewed May 10, 2024
Last updated May 10, 2024

Severity

Moderate

Weaknesses

No CWEs

CVE ID

CVE-2024-33851

GHSA ID

GHSA-3494-cfwf-56hw

Source code

No known source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.