2024-10-16 18:03:24 +00:00

29 lines
1.4 KiB
JSON

{
"id": "CVE-2024-48948",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-15T14:15:05.280",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Elliptic package 6.5.7 for Node.js, in its for ECDSA implementation, does not correctly verify valid signatures if the hash contains at least four leading 0 bytes and when the order of the elliptic curve's base point is smaller than the hash, because of an _truncateToN anomaly. This leads to valid signatures being rejected. Legitimate transactions or communications may be incorrectly flagged as invalid."
},
{
"lang": "es",
"value": "El paquete Elliptic 6.5.7 para Node.js, en su implementaci\u00f3n para ECDSA, no verifica correctamente las firmas v\u00e1lidas si el hash contiene al menos cuatro bytes 0 iniciales y cuando el orden del punto base de la curva el\u00edptica es menor que el hash, debido a una anomal\u00eda _truncateToN. Esto hace que se rechacen firmas v\u00e1lidas. Las transacciones o comunicaciones leg\u00edtimas pueden marcarse incorrectamente como no v\u00e1lidas."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/indutny/elliptic/issues/321",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/indutny/elliptic/pull/322",
"source": "cve@mitre.org"
}
]
}