CVE-2020-8929

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-8929
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-8929.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-8929
Aliases
Published
2020-10-19T13:15:13Z
Modified
2024-05-14T08:14:02.101206Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.

References

Affected packages

Git / github.com/google/tink

Affected ranges

Type
GIT
Repo
https://github.com/google/tink
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
GIT
Repo
https://github.com/tink-crypto/tink
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

go/integration/hcvault/v1.*

go/integration/hcvault/v1.4.0-rc1
go/integration/hcvault/v1.4.0-rc2

go/v1.*

go/v1.4.0-rc1
go/v1.4.0-rc2

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.0-rc2
v1.2.0-rc3
v1.2.0-rc4
v1.3.0-rc1
v1.3.0-rc2
v1.4.0-rc1
v1.4.0-rc2