Описание
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
Ссылки
- ExploitIssue Tracking
- ExploitIssue Tracking
- Third Party Advisory
Уязвимые конфигурации
EPSS
4.8 Medium
CVSS3
Дефекты
Связанные уязвимости
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid.
The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementatio ...
Valid ECDSA signatures erroneously rejected in Elliptic
Уязвимость функции _truncateToN криптографической библиотеки Elliptic программной платформы Node.js, позволяющая нарушителю выполнить произвольный код
EPSS
4.8 Medium
CVSS3