描述
In Development IL ecdh before 0.2.0, an attacker can send an invalid point (not on the curve) as the public key, and obtain the derived shared secret.
AI分析AI驱动
受影响产品
ecdh_projectecdh
参考资料
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking
- https://github.com/developmentil/ecdh/issues/3ExploitIssue Tracking