CVE-2022-24884

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-24884
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-24884.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-24884
Downstream
Related
  • GHSA-qhcg-9ffp-78pw
Published
2022-05-06T00:15:07Z
Modified
2025-09-24T11:33:18.690678Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). ecdsa_verify_[prepare_]legacy() does not check whether the signature values r and s are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: ecdsa_verify_list_legacy() will accept an arbitrary number of such forged signatures. Both the ecdsautil verify CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable.

References

Affected packages

Git / github.com/freifunk-gluon/ecdsautils

Affected ranges

Type
GIT
Repo
https://github.com/freifunk-gluon/ecdsautils
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.2
v0.3
v0.3.1
v0.3.2
v0.4