CVE-2020-14966

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-14966
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14966.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-14966
Aliases
Published
2020-06-22T12:15:10Z
Modified
2025-01-14T08:23:12.245293Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in the jsrsasign package through 8.0.18 for Node.js. It allows a malleability in ECDSA signatures by not checking overflows in the length of a sequence and '0' characters appended or prepended to an integer. The modified signatures are verified as valid. This could have a security-relevant impact if an application relied on a single canonical signature.

References

Affected packages

Git / github.com/kjur/jsrsasign

Affected ranges

Type
GIT
Repo
https://github.com/kjur/jsrsasign
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.2.0
1.3.0
1.3.1

2.*

2.0.0

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5

4.*

4.0.0
4.0.1
4.0.2
4.0.3
4.0.4
4.0.5
4.1.0
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
4.2.0
4.2.1
4.2.2
4.2.3
4.5.0
4.6.0
4.7.0
4.7.1
4.7.2
4.8.0
4.8.1
4.8.2
4.8.3
4.8.5
4.8.6
4.9.0
4.9.1
4.9.2

5.*

5.0.0
5.0.1
5.0.10
5.0.11
5.0.12
5.0.13
5.0.14
5.0.15
5.0.2
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9
5.1.0

6.*

6.0.0
6.0.1
6.1.0
6.1.1
6.1.2
6.1.4
6.2.0
6.2.1
6.2.2
6.2.3

7.*

7.0.0
7.1.0
7.1.1
7.1.2
7.1.3
7.1.4
7.2.0
7.2.1
7.2.2

8.*

8.0.0
8.0.1
8.0.10
8.0.11
8.0.12
8.0.13
8.0.14
8.0.15
8.0.16
8.0.17
8.0.18
8.0.2
8.0.3
8.0.4
8.0.5
8.0.6
8.0.7
8.0.8
8.0.9