Home / Vulnerability Database / Rust : Unsafe padding
Rust

Rust : Unsafe padding

Overview

The application uses encryption algorithm with incorrect padding which significantly weakens the encryption.

In case of asymmetric encryption you shouldn’t use RSA encryption algorithm without OAEP. The OAEP algorithm is used to preprocess messages before using RSA. The message is padded to a fixed length using OAEP and encrypted using RSA. This scheme of encryption is called RSA-OAEP.

In case of symmetric encryption the preferred method of ciphertext blocks supplementing is PKCS7, PKCS5 can also be used. Using methods with an unsuitable block dimension is unsafe.

In order to protect valuable data, use well tested implementations of standard encryption algorithms with sufficiently long keys.

Insufficient Cryptography vulnerabilities take the fifth place in the “OWASP Top 10 2016” mobile application vulnerabilities ranking.

CRITICAL

DerScanner Severity Score

Do you want to fix Rust : Unsafe padding in your application?

See also

Rust

Rust : Buffer overflow

Rust

Rust : Empty salt

Rust

Rust : Hardcoded salt