Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nbXg3LWdyNXEtODV3Nc4ABC1C
magic-crypt uses insecure cryptographic algorithms
This crate uses a number of cryptographic algorithms that are no longer considered secure and it uses them in ways that do not guarantee the integrity of the encrypted data.
MagicCrypt64
uses the insecure DES block cipher in CBC mode without authentication. This allows for practical brute force and padding oracle attacks and does not protect the integrity of the encrypted data. Key and IV are generated from user input using CRC64, which is not at all a key derivation function.
MagicCrypt64
, MagicCrypt128
, MagicCrypt192
, and MagicCrypt256
are all vulnerable to padding-oracle attacks. None of them protect the integrity of the ciphertext. Furthermore, none use password-based key derivation functions, even though the key is intended to be generated from a password.
Each of the implementations are unsound in that they use uninitialized memory without MaybeUninit
or equivalent structures.
For more information, visit the issue.
Permalink: https://github.com/advisories/GHSA-gmx7-gr5q-85w5JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nbXg3LWdyNXEtODV3Nc4ABC1C
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 9 days ago
Updated: 9 days ago
Identifiers: GHSA-gmx7-gr5q-85w5
References:
- https://github.com/magiclen/rust-magiccrypt/issues/17
- https://rustsec.org/advisories/RUSTSEC-2024-0430.html
- https://github.com/advisories/GHSA-gmx7-gr5q-85w5
Blast Radius: 0.0
Affected Packages
cargo:magic-crypt
Dependent packages: 27Dependent repositories: 45
Downloads: 389,399 total
Affected Version Ranges: <= 4.0.1
No known fixed version
All affected versions: 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.1.7, 2.1.8, 2.1.9, 2.1.10, 3.0.0, 3.0.1, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11, 3.1.12, 3.1.13, 4.0.0, 4.0.1