CVE-2023-46234
Summary
| CVE | CVE-2023-46234 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-26 15:15:00 UTC |
| Updated | 2023-11-07 19:57:00 UTC |
| Description | browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Debian -- Security Information -- DSA-5539-1 node-browserify-sign |
MISC |
www.debian.org |
|
| An upper bound check issue in `dsaVerify` leads to a signature forgery attack · Advisory · browserify/browserify-sign · GitHub |
MISC |
github.com |
|
| [Fix] properly check the upper bound for DSA signatures · browserify/browserify-sign@85994cd · GitHub |
MISC |
github.com |
|
| [SECURITY] [DLA 3635-1] node-browserify-sign security update |
MISC |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 284943 Fedora Security Update for yarnpkg (FEDORA-2024-5ecc250449)
- 284965 Fedora Security Update for yarnpkg (FEDORA-2024-28fc0c2ef4)
- 6000260 Debian Security Update for node-browserify-sign (DLA 3635-1)
- 6000302 Debian Security Update for node-browserify-sign (DSA 5539-1)
- 995754 NodeJs (Npm) Security Update for browserify-sign (GHSA-x9w5-v3q2-3rhw)