{ "id": "CVE-2024-48948", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T14:15:05.280", "lastModified": "2024-10-16T16:38:43.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid." }, { "lang": "es", "value": "El paquete Elliptic 6.5.7 para Node.js, en su implementaci\u00f3n para ECDSA, no verifica correctamente las firmas v\u00e1lidas si el hash contiene al menos cuatro bytes 0 iniciales y cuando el orden del punto base de la curva el\u00edptica es menor que el hash, debido a una anomal\u00eda _truncateToN. Esto hace que se rechacen firmas v\u00e1lidas. Las transacciones o comunicaciones leg\u00edtimas pueden marcarse incorrectamente como no v\u00e1lidas." } ], "metrics": {}, "references": [ { "url": "https://github.com/indutny/elliptic/issues/321", "source": "cve@mitre.org" }, { "url": "https://github.com/indutny/elliptic/pull/322", "source": "cve@mitre.org" } ] }