CVE Vulnerabilities

CVE-2022-24884

Improper Verification of Cryptographic Signature

Published: May 06, 2022 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). ecdsa_verify_[prepare_]legacy() does not check whether the signature values r and s are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: ecdsa_verify_list_legacy() will accept an arbitrary number of such forged signatures. Both the ecdsautil verify CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable.

Weakness

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Affected Software

Name Vendor Start Version End Version
Ecdsautils Ecdsautils_project * 0.4.1 (excluding)
Ecdsautils Ubuntu bionic *
Ecdsautils Ubuntu esm-apps/bionic *
Ecdsautils Ubuntu esm-apps/xenial *
Ecdsautils Ubuntu focal *
Ecdsautils Ubuntu impish *
Ecdsautils Ubuntu jammy *
Ecdsautils Ubuntu kinetic *
Ecdsautils Ubuntu upstream *

References