CVE-2022-23001

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23001
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23001.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23001
Published
2022-07-29T19:15:08Z
Modified
2024-09-03T04:11:09.006792Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.

References

Affected packages

Git / github.com/westerndigitalcorporation/sweet-b

Affected ranges

Type
GIT
Repo
https://github.com/westerndigitalcorporation/sweet-b
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

audit-tob-2020-01
v1