GHSA-gmx7-gr5q-85w5

Suggest an improvement
Source
https://github.com/advisories/GHSA-gmx7-gr5q-85w5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-gmx7-gr5q-85w5/GHSA-gmx7-gr5q-85w5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-gmx7-gr5q-85w5
Published
2024-12-30T16:53:24Z
Modified
2024-12-30T16:53:24Z
Summary
magic-crypt uses insecure cryptographic algorithms
Details

This crate uses a number of cryptographic algorithms that are no longer considered secure and it uses them in ways that do not guarantee the integrity of the encrypted data.

MagicCrypt64 uses the insecure DES block cipher in CBC mode without authentication. This allows for practical brute force and padding oracle attacks and does not protect the integrity of the encrypted data. Key and IV are generated from user input using CRC64, which is not at all a key derivation function.

MagicCrypt64, MagicCrypt128, MagicCrypt192, and MagicCrypt256 are all vulnerable to padding-oracle attacks. None of them protect the integrity of the ciphertext. Furthermore, none use password-based key derivation functions, even though the key is intended to be generated from a password.

Each of the implementations are unsound in that they use uninitialized memory without MaybeUninit or equivalent structures.

For more information, visit the issue.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-326"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2024-12-30T16:53:24Z"
}
References

Affected packages

crates.io / magic-crypt

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
4.0.1