7.5
CVSSv3

CVE-2022-24884

Published: 06/05/2022 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged signatures. Both the `ecdsautil verify` CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ecdsautils project ecdsautils

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

It was discovered that ecdsautils, a collection of ECDSA elliptic curve cryptography CLI tools verified some cryptographic signatures incorrectly: A signature consisting only of zeroes was always considered valid, making it trivial to forge signatures For the oldstable distribution (buster), this problem has been fixed in version 032+git20151018 ...
ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify) `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures Requiring multiple signatures from different public keys d ...