CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
24.9%
browserify-sign is vulnerable to Improper Verification Of Cryptographic Signature. An upper bound check issue in DSA verification allows an attacker to construct signatures that can be successfully verified by any public key, which leads to a signature forgery attack. The attacker could exploit this vulnerability by tricking a user into signing a malicious message with their private key. The attacker could then use the forged signature to impersonate the user or to authorize malicious transactions.
github.com/advisories/GHSA-x9w5-v3q2-3rhw
github.com/browserify/browserify-sign/commit/85994cd6348b50f2fd1b73c54e20881416f44a30
github.com/browserify/browserify-sign/security/advisories/GHSA-x9w5-v3q2-3rhw
lists.debian.org/debian-lts-announce/2023/10/msg00040.html
lists.fedoraproject.org/archives/list/[email protected]/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/
lists.fedoraproject.org/archives/list/[email protected]/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/
www.debian.org/security/2023/dsa-5539