#VU28771 Improper Verification of Cryptographic Signature in p5-Crypt-Perl - CVE-2020-13895
Published: June 7, 2020
p5-Crypt-Perl
Felipe Gasper
Description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to improper ECDSA signature verification for the secp256r1 (prime256v1) curve, when r and s are small and when s = 1. A remote attacker can bypass signature verification process for Crypt::Perl::ECDSA and trick the victim into installing malicious code.