Cryptographic Issues Affecting com.google.crypto.tink:tink package, versions [,1.5.0)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-COMGOOGLECRYPTOTINK-1018839

  • published

    16 Oct 2020

  • disclosed

    16 Oct 2020

  • credit

    Unknown

How to fix?

Upgrade com.google.crypto.tink:tink to version 1.5.0 or higher.

Overview

com.google.crypto.tink:tink is a multi-language, cross-platform, open source library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse.

Affected versions of this package are vulnerable to Cryptographic Issues. Under some circumstances it allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext.

No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised.