Lucene search

K
githubGitHub Advisory DatabaseGHSA-977X-G7H5-7QGW
HistoryAug 02, 2024 - 9:31 a.m.

Elliptic's ECDSA missing check for whether leading bit of r and s is zero

2024-08-0209:31:35
CWE-130
GitHub Advisory Database
github.com
16
elliptic
ecdsa
check
leading bit
zero
node.js
malleability
signature
software

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.4%

In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.

Affected configurations

Vulners
Node
elliptic_projectellipticRange2.0.0node.js
OR
elliptic_projectellipticRange6.5.6node.js
VendorProductVersionCPE
elliptic_projectelliptic*cpe:2.3:a:elliptic_project:elliptic:*:*:*:*:*:node.js:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.4%