Описание
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the ECDSA implementation, the point at infinity is mishandled. This means that for an extreme value in k and s^-1, the signature verification fails even if the signature is correct. This behavior is not solely a usability problem. There are some threat models where an attacker can benefit by successfully guessing users for whom signature verification will fail.
Ссылки
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- Issue TrackingPatchThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.2 (исключая)
cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*
EPSS
Процентиль: 38%
0.00169
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-347
Связанные уязвимости
CVSS3: 7.5
github
больше 4 лет назад
Improper Verification of Cryptographic Signature in fastecdsa
EPSS
Процентиль: 38%
0.00169
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-347