Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXZoN20tcDcyNC02MmMy
Signature Malleabillity in elliptic
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
Permalink: https://github.com/advisories/GHSA-vh7m-p724-62c2JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXZoN20tcDcyNC02MmMy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 4 years ago
Updated: 3 months ago
CVSS Score: 7.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
EPSS Percentage: 0.00541
EPSS Percentile: 0.77133
Identifiers: GHSA-vh7m-p724-62c2, CVE-2020-13822
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-13822
- https://github.com/indutny/elliptic/issues/226
- https://medium.com/@herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4
- https://www.npmjs.com/package/elliptic
- https://github.com/indutny/elliptic/commit/856fe4d99fe7b6200556e6400b3bf585b1721bec
- https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99a4
- https://yondon.blog/2019/01/01/how-not-to-use-ecdsa
- https://github.com/advisories/GHSA-vh7m-p724-62c2
Blast Radius: 44.8
Affected Packages
npm:elliptic
Dependent packages: 2,976Dependent repositories: 667,005
Downloads: 36,408,671 last month
Affected Version Ranges: < 6.5.3
Fixed in: 6.5.3
All affected versions: 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.6.1, 0.7.0, 0.8.0, 0.9.0, 0.9.1, 0.9.2, 0.10.0, 0.10.1, 0.10.2, 0.11.0, 0.11.1, 0.12.0, 0.13.1, 0.13.2, 0.14.0, 0.14.1, 0.14.2, 0.15.0, 0.15.1, 0.15.2, 0.15.3, 0.15.4, 0.15.5, 0.15.6, 0.15.7, 0.15.8, 0.15.9, 0.15.10, 0.15.11, 0.15.12, 0.15.13, 0.15.14, 0.15.15, 0.15.17, 0.16.0, 1.0.0, 1.0.1, 2.0.0, 2.0.1, 2.0.2, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.1.0, 4.0.0, 4.1.0, 5.0.0, 5.1.0, 5.2.0, 5.2.1, 6.0.0, 6.0.1, 6.0.2, 6.1.0, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.3.0, 6.3.1, 6.3.2, 6.3.3, 6.4.0, 6.4.1, 6.5.0, 6.5.1, 6.5.2
All unaffected versions: 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.6.0, 6.6.1