CVE-2024-42459: Elliptic's EDDSA missing signature length check
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.23614%
CWE
Published
8/2/2024
Updated
8/15/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| elliptic | npm | >= 4.0.0, <= 6.5.6 | 6.5.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing signature length validation in EDDSA implementation. The commit accb61e adds a critical assertion (assert(sig.length === eddsa.encodingLength * 2)) in lib/elliptic/eddsa/signature.js to fix this. The original code in Signature constructor processed arbitrary-length arrays, enabling signature malleability through zero-byte manipulation. This matches the CVE description of 'missing signature length check' allowing byte modification.