String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string.
As stated in the documentation: "If the lengths of the strings are different, because equals returns false right away the size of the secret string may be leaked (but not its contents)."
This is similar to CVE-2020-36829
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL | Technical Description |
Configurations
History
11 Apr 2025, 18:10
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-203 | |
CPE | cpe:2.3:a:fractal:string\:\:compare\:\:constanttime:*:*:*:*:*:perl:*:* | |
References | () https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL - Technical Description | |
First Time |
Fractal string\
Fractal |
28 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-28 03:15
Updated : 2025-04-11 18:10
NVD link : CVE-2024-13939
Mitre link : CVE-2024-13939
JSON object : View
Products Affected
fractal
- string\
CWE
CWE-203
Observable Discrepancy