Описание
MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library’s Elliptic Curve Cryptography (ECC) implementation.
An attacker could potentially abuse these bugs to learn information about a server’s private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.
The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation. In addition, an internal review resulted in other improvements to prevent rare failures in ECDH and ECDSA when using the NUMS curves.
FAQ
The vulnerable version of the MSR Crypto JavaScript Security library is 1.4. The version with the security update is 1.4.1.
There are two possible steps required:
- Install the 1.4.1 update.
- If you are using the NIST P-521 curve, revoke and replace X.509 certificates issued using the NIST P-521 curve, and invalidate data signed by such certificates.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Microsoft Research JavaScript Cryptography Library V1.4 |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
Связанные уязвимости
A Security Feature Bypass vulnerability exists in MSR JavaScript Cryptography Library that is caused by incorrect arithmetic computations, aka "MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability." This affects Microsoft Research JavaScript Cryptography Library.
EPSS