tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.
CVSS
No CVSS.
References
Configurations
No configuration.
History
01 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bitcoinjs/tiny-secp256k1/security/advisories/GHSA-5vhg-9xg4-cv9m - | |
Summary |
|
01 Jul 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-01 03:15
Updated : 2025-07-03 15:14
NVD link : CVE-2024-49365
Mitre link : CVE-2024-49365
CVE.ORG link : CVE-2024-49365
JSON object : View
Products Affected
No product.
CWE
CWE-347
Improper Verification of Cryptographic Signature