Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 308e36c

Browse files
1 parent c9aa3b9 commit 308e36c

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

advisories/github-reviewed/2025/09/GHSA-3wfh-36rx-9537/GHSA-3wfh-36rx-9537.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-3wfh-36rx-9537",
4-
"modified": "2025-09-16T22:20:08Z",
4+
"modified": "2025-09-22T15:00:46Z",
55
"published": "2025-09-16T22:20:08Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2025-59432"
8+
],
79
"summary": "Timing Attack Vulnerability in SCRAM Authentication",
810
"details": "### Impact\n\nA timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because `Arrays.equals` was used to compare secret values such as client proofs and server signatures. Since `Arrays.equals` performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted.\n\n### Patches\n\nThis vulnerability has been patched by replacing `Arrays.equals` with `MessageDigest.isEqual`, which ensures constant-time comparison.\n\nUsers should upgrade to version **3.2** or later to mitigate this issue.\n\n### Workarounds\n\nBecause the attack requires high precision and repeated attempts, the risk is limited, but the only reliable mitigation is to upgrade to a patched release (version 3.2 or later).\n\n### References\n\n- [Java `MessageDigest.isEqual` Documentation](https://docs.oracle.com/en/java/javase/25/docs/api/java.base/java/security/MessageDigest.html#isEqual(byte[],byte[]))",
911
"severity": [

0 commit comments

Comments
 (0)