Elliptic's ECDSA missing check for whether leading bit of r and s is zero
- Severity:
- Low
Description
In the Elliptic package 6.5.6 for Node.js, ECDSA signature malleability occurs because there is a missing check for whether the leading bit of r and s is zero.
Recommendation
Update the elliptic
package to the latest compatible version. Followings are version details:
- Affected version(s): >= 2.0.0, <= 6.5.6
- Patched version(s): 6.5.7
References
Related Issues
- Volto affected by possible DoS by invoking specific URL by anonymous user - CVE-2025-58047
- Elliptic's private key extraction in ECDSA upon signing a malformed input (e.g. a string) - Vulnerability
- Potential DoS when using ContextLines integration (GHSA-r5w7-f542-q2j4) 10 - Vulnerability
- Elliptic's verify function omits uniqueness validation - CVE-2024-48949
- Tags:
- npm
- elliptic
Anything's wrong? Let us know Last updated on August 15, 2024