Vulnerability Description
The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Indutny | Elliptic | 6.5.2 |
Related Weaknesses (CWE)
References
- https://github.com/indutny/elliptic/issues/226ExploitThird Party Advisory
- https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99
- https://www.npmjs.com/package/ellipticThird Party Advisory
- https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/Third Party Advisory
- https://github.com/indutny/elliptic/issues/226ExploitThird Party Advisory
- https://medium.com/%40herman_10687/malleability-attack-why-it-matters-7b5f59fb99
- https://www.npmjs.com/package/ellipticThird Party Advisory
- https://yondon.blog/2019/01/01/how-not-to-use-ecdsa/Third Party Advisory
FAQ
What is CVE-2020-13822?
CVE-2020-13822 is a vulnerability with a CVSS score of 7.7 (HIGH). The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact ...
How severe is CVE-2020-13822?
CVE-2020-13822 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-13822?
Check the references section above for vendor advisories and patch information. Affected products include: Indutny Elliptic.