Timing Attack The advisory has been revoked - it doesn't affect any version of package github.com/coyim/otr3 Open this link in a new tab


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMCOYIMOTR3-570194
  • published 22 May 2020
  • disclosed 22 May 2020
  • credit Unknown

Introduced: 22 May 2020

CVE NOT AVAILABLE CWE-208 Open this link in a new tab

How to fix?

Upgrade github.com/coyim/otr3 to version 0.0.0 or higher.

Overview

github.com/coyim/otr3 is a Go implementation of the OTR 3 protocol, with libotr 4.1.0 feature parity.

Affected versions of this package are vulnerable to Timing Attack. Timing attacks could be possible within the package when parsing messages. However, it should be noted that the attack complexity to exploit this vulnerability is high.

References