browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
References
Configurations
History
10 Apr 2025, 20:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/ - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/ - Release Notes |
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. |
Information
Published : 2023-10-26 15:15
Updated : 2025-04-10 20:47
NVD link : CVE-2023-46234
Mitre link : CVE-2023-46234
CVE.ORG link : CVE-2023-46234
JSON object : View
Products Affected
debian
- debian_linux
browserify
- browserify-sign
CWE
CWE-347
Improper Verification of Cryptographic Signature