PYSEC-2024-39

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/fastecdsa/PYSEC-2024-39.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2024-39
Aliases
Published
2024-02-24T05:15:00Z
Modified
2024-02-24T07:56:35.655367Z
Summary
[none]
Details

Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability.

References

Affected packages

PyPI / fastecdsa

Package

Affected ranges

Type
GIT
Repo
https://github.com/AntonKueltz/fastecdsa
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.2

Affected versions

1.*

1.0.0b1
1.0.1b1
1.0.1b2
1.0.1b3
1.0.1
1.0.2
1.0.3
1.1.0
1.1.1
1.1.2
1.1.3
1.2.1
1.3.1
1.3.2
1.4.1
1.4.2
1.4.3
1.5.1
1.5.2
1.6.1
1.6.2
1.6.3
1.6.4
1.6.5
1.7.0
1.7.1
1.7.2
1.7.3
1.7.4
1.7.5

2.*

2.0.0
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.2.0
2.2.1
2.2.2
2.2.3
2.3.0
2.3.1