Timing Attack The advisory has been revoked - it doesn't affect any version of package github.com/coyim/otr3  (opens in a new tab)


Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMCOYIMOTR3-570194
  • published22 May 2020
  • disclosed22 May 2020
  • creditUnknown

Introduced: 22 May 2020

CVE NOT AVAILABLE CWE-208  (opens in a new tab)

How to fix?

Upgrade github.com/coyim/otr3 to version 0.0.0 or higher.

Overview

github.com/coyim/otr3 is a Go implementation of the OTR 3 protocol, with libotr 4.1.0 feature parity.

Affected versions of this package are vulnerable to Timing Attack. Timing attacks could be possible within the package when parsing messages. However, it should be noted that the attack complexity to exploit this vulnerability is high.

References