CVE-2024-21502: Uninitialized Variable in fastecdsa
(updated )
Versions of the package fastecdsa before 2.3.2 use an Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable’s actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability.
References
- gist.github.com/keltecc/49da037072276f21b005a8337c15db26
- github.com/AntonKueltz/fastecdsa
- github.com/AntonKueltz/fastecdsa/blob/v2.3.1/src/curveMath.c%23L210
- github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36
- github.com/advisories/GHSA-ph86-g9r3-5qw4
- nvd.nist.gov/vuln/detail/CVE-2024-21502
- security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045
Detect and mitigate CVE-2024-21502 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →