CVE-2022-35961
Summary
| CVE | CVE-2022-35961 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-15 11:21:00 UTC |
| Updated | 2022-12-06 19:51:00 UTC |
| Description | OpenZeppelin Contracts is a library for secure smart contract development. The functions `ECDSA.recover` and `ECDSA.tryRecover` are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single `bytes` argument, and not the functions that take `r, v, s` or `r, vs` as separate arguments. The potentially affected contracts are those that implement signature reuse or replay protection by marking the signature itself as used rather than the signed message or a nonce included in it. A user may take a signature that has already been submitted, submit it again in a different form, and bypass this protection. The issue has been patched in 4.7.3. |
Risk And Classification
Problem Types: CWE-354
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openzeppelin | Contracts | All | All | All | All |
| Application | Openzeppelin | Contracts-upgradeable | All | All | All | All |
| Application | Openzeppelin | Contracts Upgradeable | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fix ECDSA signature malleability by frangio · Pull Request #3610 · OpenZeppelin/openzeppelin-contracts · GitHub | MISC | github.com | |
| Release v4.7.3 · OpenZeppelin/openzeppelin-contracts · GitHub | MISC | github.com | |
| ECDSA signature malleability · Advisory · OpenZeppelin/openzeppelin-contracts · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.