Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-46234
HistoryOct 26, 2023 - 2:31 p.m.

CVE-2023-46234 browserify-sign vulnerable via an upper bound check issue in `dsaVerify` that leads to a signature forgery attack

2023-10-2614:31:35
CWE-347
GitHub_M
raw.githubusercontent.com
2
cve-2023-46234
browserify-sign
signature forgery
upper bound check
dsaverify
public key
vulnerability
patch
version 4.2.2

6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.0%

browserify-sign is a package to duplicate the functionality of node’s crypto public key functions, much of this is based on Fedor Indutny’s work on indutny/tls.js. An upper bound check issue in dsaVerify function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.

6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.0%