The verify function in the Stark Bank Python ECDSA library (aka starkbank-escada or ecdsa-python) before 2.0.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Link | Tags |
---|---|
https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/ | third party advisory exploit |
https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1 | third party advisory release notes |
https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f | third party advisory patch |