Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and block signature verification bypass in the transaction and block validator allowing a single node to sign a transaction and/or block multiple times, each with a random nonce, and have other validating nodes accept them as separate valid signatures.
References
Link | Resource |
---|---|
https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 | Third Party Advisory |
https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 - Third Party Advisory |
Information
Published : 2018-06-01 19:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-3756
Mitre link : CVE-2018-3756
CVE.ORG link : CVE-2018-3756
JSON object : View
Products Affected
hyperledger
- iroha
CWE
CWE-347
Improper Verification of Cryptographic Signature