A mis-handling of invalid unicode characters in the Java implementation of Tink versions prior to 1.5 allows an attacker to change the ID part of a ciphertext, which result in the creation of a second ciphertext that can decrypt to the same plaintext. This can be a problem with encrypting deterministic AEAD with a single key, and rely on a unique ciphertext-per-plaintext.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2020-10-19T12:15:16
Updated: 2024-08-04T10:12:11.052Z
Reserved: 2020-02-12T00:00:00
Link: CVE-2020-8929
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-10-19T13:15:13.437
Modified: 2020-10-29T22:16:48.257
Link: CVE-2020-8929
Redhat
No data.