browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
References
Configurations
History
No history.
Information
Published : 2023-10-26 15:15
Updated : 2024-02-28 03:15
NVD link : CVE-2023-46234
Mitre link : CVE-2023-46234
CVE.ORG link : CVE-2023-46234
JSON object : View
Products Affected
debian
- debian_linux
browserify
- browserify-sign
CWE
CWE-347
Improper Verification of Cryptographic Signature