Description
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0571 | The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. |
Github GHSA |
GHSA-vh7m-p724-62c2 | Signature Malleabillity in elliptic |
References
History
Wed, 16 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Indutny
Indutny elliptic |
|
| CPEs | cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Elliptic Project
Elliptic Project elliptic |
Indutny
Indutny elliptic |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:25:16.506Z
Reserved: 2020-06-04T00:00:00.000Z
Link: CVE-2020-13822
No data.
Status : Modified
Published: 2020-06-04T15:15:13.510
Modified: 2024-11-21T05:01:56.443
Link: CVE-2020-13822
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA