CVE-2020-14966

Source
https://cve.org/CVERecord?id=CVE-2020-14966
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14966.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-14966
Aliases
Published
2020-06-22T12:15:10.087Z
Modified
2025-11-14T10:49:02.059665Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impact if an application relied on a single canonical signature.

References

Affected packages

Git / github.com/kjur/jsrsasign

Affected ranges

Type
GIT
Repo
https://github.com/kjur/jsrsasign
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*
1.2.0
1.3.0
1.3.1
2.*
2.0.0
3.*
3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
4.*
4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5
4.1.0
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
4.2.0
4.2.1
4.2.2
4.2.3
4.5.0
4.6.0
4.7.0
4.7.1
4.7.2
4.8.0
4.8.1
4.8.2
4.8.3
4.8.5
4.8.6
4.9.0
4.9.1
4.9.2
5.*
5.0.0
5.0.1
5.0.10
5.0.11
5.0.12
5.0.13
5.0.14
5.0.15
5.0.2
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9
5.1.0
6.*
6.0.0
6.0.1
6.1.0
6.1.1
6.1.2
6.1.4
6.2.0
6.2.1
6.2.2
6.2.3
7.*
7.0.0
7.1.0
7.1.1
7.1.2
7.1.3
7.1.4
7.2.0
7.2.1
7.2.2
8.*
8.0.0
8.0.1
8.0.10
8.0.11
8.0.12
8.0.13
8.0.14
8.0.15
8.0.16
8.0.17
8.0.2
8.0.3
8.0.4
8.0.5
8.0.6
8.0.7
8.0.8
8.0.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-14966.json"