CVE-2018-3756

Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and block signature verification bypass in the transaction and block validator allowing a single node to sign a transaction and/or block multiple times, each with a random nonce, and have other validating nodes accept them as separate valid signatures.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hyperledger:iroha:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:hyperledger:iroha:1.0.0:beta1:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 - Third Party Advisory () https://github.com/hyperledger/iroha/releases/tag/v1.0.0_beta-2 - Third Party Advisory

Information

Published : 2018-06-01 19:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-3756

Mitre link : CVE-2018-3756

CVE.ORG link : CVE-2018-3756


JSON object : View

Products Affected

hyperledger

  • iroha
CWE
CWE-347

Improper Verification of Cryptographic Signature