CVE-2020-8929

A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.
Configurations

Configuration 1

cpe:2.3:a:google:tink:*:*:*:*:*:*:*:*

Information

Published : 2020-10-19 01:15

Updated : 2020-10-29 10:16


NVD link : CVE-2020-8929

Mitre link : CVE-2020-8929

Products Affected
No products.