説明
In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
AI分析AIによる分析
影響を受ける製品
ecdh_projectecdh
参照
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking