This security bulletin contains one high risk vulnerability.
CWE-310 - Cryptographic Issues
Exploit availability: NoDescription
The vulnerability allows a remote attacker to comrpomise the target system.
The vulnerability exists due to the affected software allows ECDSA signature malleability via variations in encoding, leading "\0" bytes, or integer overflows. A remote attacker can cause a security-relevant impact if an application relied on a single canonical signature.Mitigation
Install updates from vendor's website.Vulnerable software versions
elliptic: 6.5.2External links
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.