A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private key.
References
Configurations
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html - Third Party Advisory, VDB Entry | |
References | () https://github.com/openpgpjs/openpgpjs/pull/853 - Third Party Advisory | |
References | () https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e - Patch, Third Party Advisory | |
References | () https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0 - Release Notes | |
References | () https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ - Exploit, Third Party Advisory | |
References | () https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1 - Third Party Advisory |
Information
Published : 2019-08-22 16:15
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9155
Mitre link : CVE-2019-9155
CVE.ORG link : CVE-2019-9155
JSON object : View
Products Affected
openpgpjs
- openpgpjs
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm