GHSA-8qxj-f9rh-9fg2

Suggest an improvement
Source
https://github.com/advisories/GHSA-8qxj-f9rh-9fg2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-8qxj-f9rh-9fg2/GHSA-8qxj-f9rh-9fg2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8qxj-f9rh-9fg2
Aliases
Published
2020-04-01T16:35:26Z
Modified
2024-09-20T17:09:34.659579Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Improper Verification of Cryptographic Signature in Pure-Python ECDSA
Details

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.

References

Affected packages

PyPI / ecdsa

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.13.3

Affected versions

0.*

0.6
0.7
0.8
0.9
0.10
0.11
0.12
0.13
0.13.1
0.13.2

Ecosystem specific

{
    "affected_functions": [
        "ecdsa.der.remove_constructed",
        "ecdsa.der.remove_sequence",
        "ecdsa.der.remove_octet_string",
        "ecdsa.der.remove_object",
        "ecdsa.der.remove_integer",
        "ecdsa.der.read_length",
        "ecdsa.keys.VerifyingKey.verify_digest",
        "ecdsa.util.sigdecode_string",
        "ecdsa.util.sigdecode_strings"
    ]
}