CVE-2023-46234

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46234
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46234.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-46234
Aliases
Downstream
Related
Published
2023-10-26T14:31:35Z
Modified
2025-10-30T20:22:58.977274Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
browserify-sign vulnerable via an upper bound check issue in `dsaVerify` that leads to a signature forgery attack
Details

browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in dsaVerify function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

Database specific
{
    "cwe_ids": [
        "CWE-347"
    ]
}
References

Affected packages

Git / github.com/browserify/browserify-sign

Affected ranges

Type
GIT
Repo
https://github.com/browserify/browserify-sign
Events

Affected versions

v2.*

v2.6.0
v2.6.1
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.7.4
v2.7.5

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.8

v4.*

v4.0.0
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.1.0
v4.2.0
v4.2.1