CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS
Percentile
77.9%
ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign,
verify). ecdsa_verify_[prepare_]legacy()
does not check whether the
signature values r
and s
are non-zero. A signature consisting only of
zeroes is always considered valid, making it trivial to forge signatures.
Requiring multiple signatures from different public keys does not mitigate
the issue: ecdsa_verify_list_legacy()
will accept an arbitrary number of
such forged signatures. Both the ecdsautil verify
CLI command and the
libecdsautil library are affected. The issue has been fixed in ecdsautils
0.4.1. All older versions of ecdsautils (including versions before the
split into a library and a CLI utility) are vulnerable.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | ecdsautils | < 0.3.2+git20151018-2ubuntu0.18.04.1~esm1 | UNKNOWN |
ubuntu | 20.04 | noarch | ecdsautils | < 0.3.2+git20151018-2+deb10u1build0.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | ecdsautils | < 0.3.2+git20151018-2+deb10u1build0.22.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | ecdsautils | < 0.3.2+git20151018-2ubuntu0.16.04.1~esm1 | UNKNOWN |
github.com/freifunk-gluon/ecdsautils/commit/1d4b091abdf15ad7b2312535b5b95ad70f6dbd08
github.com/freifunk-gluon/ecdsautils/commit/1d4b091abdf15ad7b2312535b5b95ad70f6dbd08 (v0.4.1)
github.com/freifunk-gluon/ecdsautils/commit/39b6d0a77414fd41614953a0e185c4eefa2f88ad
github.com/freifunk-gluon/ecdsautils/security/advisories/GHSA-qhcg-9ffp-78pw
launchpad.net/bugs/cve/CVE-2022-24884
nvd.nist.gov/vuln/detail/CVE-2022-24884
security-tracker.debian.org/tracker/CVE-2022-24884
ubuntu.com/security/notices/USN-6239-1
www.cve.org/CVERecord?id=CVE-2022-24884
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS
Percentile
77.9%