Description
A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private key.
Remediation
References
https://github.com/openpgpjs/openpgpjs/pull/853
https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1
https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/
https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e
http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html
Related Vulnerabilities
CVE-2016-1000346 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on
CVE-2019-10422 Vulnerability in maven package org.ukiuni.callotherjenkins:call-remote-job-plugin
CVE-2022-33891 Vulnerability in maven package org.apache.spark:spark-core_2.12
CVE-2017-10355 Vulnerability in maven package xerces:xercesimpl
CVE-2020-35490 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind