Description
browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3635-1 | node-browserify-sign security update |
Debian DSA |
DSA-5539-1 | node-browserify-sign security update |
EUVD |
EUVD-2023-2835 | browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. |
Github GHSA |
GHSA-x9w5-v3q2-3rhw | browserify-sign upper bound check issue in `dsaVerify` leads to a signature forgery attack |
Ubuntu USN |
USN-6800-1 | browserify-sign vulnerability |
References
History
Thu, 13 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. | browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. |
| Title | browserify-sign vulnerable via an upper bound check issue in `dsaVerify` that leads to a signature forgery attack | browserify-sign vulnerable via an upper bound check issue in `dsaVerify` that leads to a signature forgery attack |
Sun, 08 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat openshift Distributed Tracing |
|
| CPEs | cpe:/a:redhat:openshift_distributed_tracing:2.9::el8 | |
| Vendors & Products |
Redhat
Redhat openshift Distributed Tracing |
Mon, 19 Aug 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Redhat
Redhat openshift Distributed Tracing |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:14:23.092Z
Reserved: 2023-10-19T20:34:00.946Z
Link: CVE-2023-46234
No data.
Status : Analyzed
Published: 2023-10-26T15:15:09.087
Modified: 2025-04-10T20:47:25.493
Link: CVE-2023-46234
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN