First published: Thu May 05 2022(Updated: )
ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged signatures. Both the `ecdsautil verify` CLI command and the libecdsautil library are affected. The issue has been fixed in ecdsautils 0.4.1. All older versions of ecdsautils (including versions before the split into a library and a CLI utility) are vulnerable.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ecdsautils | 0.3.2+git20151018-2+deb10u1 0.3.2+git20151018-2+deb11u1 0.4.1-3 | |
ubuntu/ecdsautils | <0.3.2+ | 0.3.2+ |
ubuntu/ecdsautils | <0.3.2+ | 0.3.2+ |
ubuntu/ecdsautils | <0.3.2+ | 0.3.2+ |
ubuntu/ecdsautils | <0.4.1-1 | 0.4.1-1 |
ecdsautils | <0.4.1 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24884 has a high severity due to its potential for signature forgery.
To fix CVE-2022-24884, upgrade ecdsautils to versions 0.3.2+git20151018-2+deb10u1, 0.3.2+git20151018-2+deb11u1, or 0.4.1-3 or later.
Affected versions of ecdsautils include 0.3.2 and any versions prior to 0.4.1.
Yes, CVE-2022-24884 can be exploited without authentication, making it particularly dangerous.
CVE-2022-24884 impacts Debian, Ubuntu, and Fedora distributions that use vulnerable versions of ecdsautils.