browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2.
References
Configurations
History
10 Apr 2025, 20:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/ - Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/ - Release Notes |
13 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) browserify-sign is a package to duplicate the functionality of node's crypto public key functions, much of this is based on Fedor Indutny's work on indutny/tls.js. An upper bound check issue in `dsaVerify` function allows an attacker to construct signatures that can be successfully verified by any public key, thus leading to a signature forgery attack. All places in this project that involve DSA verification of user-input signatures will be affected by this vulnerability. This issue has been patched in version 4.2.2. |
21 Nov 2024, 08:28
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/browserify/browserify-sign/commit/85994cd6348b50f2fd1b73c54e20881416f44a30 - Third Party Advisory | |
References | () https://github.com/browserify/browserify-sign/security/advisories/GHSA-x9w5-v3q2-3rhw - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00040.html - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/ - | |
References | () https://www.debian.org/security/2023/dsa-5539 - Third Party Advisory |
28 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-26 15:15
Updated : 2025-04-10 20:47
NVD link : CVE-2023-46234
Mitre link : CVE-2023-46234
CVE.ORG link : CVE-2023-46234
JSON object : View
Products Affected
debian
- debian_linux
browserify
- browserify-sign
CWE
CWE-347
Improper Verification of Cryptographic Signature