CVE-2019-14859

Publication date 14 October 2019

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.1 · Critical

Score breakdown

A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.

Read the notes from the security team

Status

Package Ubuntu Release Status
python-ecdsa 19.10 eoan
Fixed 0.13.2-2ubuntu0.1
19.04 disco
Fixed 0.13-3ubuntu0.1
18.04 LTS bionic
Fixed 0.13-2ubuntu0.18.04.1
16.04 LTS xenial
Fixed 0.13-2ubuntu0.16.04.1
14.04 LTS trusty Not in release

Notes


mdeslaur

included in CVE-2019-14853 commits

Severity score breakdown

Parameter Value
Base score 9.1 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N