Timing Attack The advisory has been revoked - it doesn't affect any version of package github.com/coyim/otr3 Open this link in a new tab

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id


  • published

    22 May 2020

  • disclosed

    22 May 2020

  • credit


How to fix?

Upgrade github.com/coyim/otr3 to version 0.0.0 or higher.


github.com/coyim/otr3 is a Go implementation of the OTR 3 protocol, with libotr 4.1.0 feature parity.

Affected versions of this package are vulnerable to Timing Attack. Timing attacks could be possible within the package when parsing messages. However, it should be noted that the attack complexity to exploit this vulnerability is high.