Safety vulnerability ID: 42545
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
Latest version: 2.2.0
A lightweight and fast pure python ECDSA library
The verify function in the Stark Bank Python ECDSA library (ecdsa-python) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. See CVE-2021-43572.
MISC:https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1: https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1
MISC:https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/: https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application