Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2016-6298: Million Messages Attack vulnerability #65

Closed
simo5 opened this issue Aug 31, 2016 · 0 comments
Closed

CVE-2016-6298: Million Messages Attack vulnerability #65

simo5 opened this issue Aug 31, 2016 · 0 comments

Comments

@simo5
Copy link
Member

simo5 commented Aug 31, 2016

The jwcrypto implementation of the RSA1_5 algorithm is vulnerable to the Million Message Attack described in RFC 3128.

A timing attack can be leveraged against the implementation to detect when a chosed ciphertext generates a valid header and padding because invalid headr/padding generates a code exception and cryptographic operations are terminated earlier resulting in measurably faster processing over the network.

Many thanks to Dennis Detering dennis.detering@rub.de for discovering and reporting this vulnerability.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant