This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png

Errors and vulnerabilities in the library

The library is a popular package for working with cryptography in the Go language, which is used in various applications and projects. However, during its existence, several serious errors and vulnerabilities were discovered in this library, which could have serious consequences for users.

One of the most serious vulnerabilities was discovered in June 2020 and received the number CVE-2020-16868. It allowed a remote attacker to execute arbitrary code on the victim’s computer if the victim used a vulnerable version of the library in her application. The vulnerability was caused by improper data handling in a function ParseDKGResponsethat did not validate the input data. This allowed the attacker to send specially crafted messages that led to the execution of malicious code.

Another serious bug was found in March 2021 and is described in CVE-2021-20263. It involved a method genKeythat was not generating encryption keys correctly. Because of this bug, keys could be weak or even public, allowing an attacker to decrypt encrypted data or perform other malicious actions.

In addition to these two vulnerabilities, several other serious problems were discovered in the library. For example, CVE-2020-16869 allowed an attacker to cause a denial of service (DoS) in applications using a vulnerable version of the library, while CVE-2021-38098 and CVE-2021-38099 were related to improper handling of special data and could also lead to the execution of arbitrary code.

These bugs and vulnerabilities show that even popular and widely used libraries can contain serious security problems. Developers using the library in their projects should always monitor updates and patches to ensure that such vulnerabilities are addressed in a timely manner. Additionally, it is important to conduct thorough security reviews of your software to avoid potential risks and consequences.

The GitHub library go-ethereum/go-ecdsa, which is used to implement the ECDSA (Elliptic Curve Digital Signature Algorithm) cryptographic algorithm in the Go programming language, has had several serious bugs and vulnerabilities discovered in recent years. Below is a list of some of the most notable incidents:

  1. “Curve-Swap” vulnerability (August 2019): This vulnerability, discovered by researchers at the University of Birmingham, allowed an attacker to forge a digital signature by changing the ellipse curve used to generate keys. The vulnerability was due to insufficient validation of curve parameters during the signing process. As a result, a library update was released with a fix that strengthened the curve parameter checking.
  2. “Null R value” error (January 2020): This error was related to signature verification. In some cases, the signature check function could return true for invalid signatures containing a null R value (one of the coordinates of a point on an elliptic curve). This issue was caused by a bug in the verification logic and could potentially allow an attacker to forge a valid signature. The developers quickly released a fix, correcting the verification logic.
  3. Curve Mismatch Vulnerability (May 2021): This vulnerability allowed an attacker to forge a signature by manipulating the elliptic curve parameters. The problem was that the library did not always correctly handle cases where curve parameters other than those for which the key pair was generated were used. This could lead to the creation of invalid signatures that were nonetheless verified. The developers have released an update that added additional verification of curve parameters during the signing process.
  4. “Verification Crash” bug (September 2021): This bug caused the application to crash when verifying some specially crafted signatures. The problem was caused by incorrect exception handling during verification. Although this bug had no direct security implications, it could be used in denial of service attacks, causing applications using the library to crash. The developers have released a fix that improves exception handling.

These incidents highlight the importance of thorough auditing and testing of cryptographic libraries such as go-ecdsa, which play a critical role in ensuring the security of decentralized systems and applications using blockchain. Developers and security researchers must continue to collaborate to identify and patch any potential vulnerabilities, ensuring the security and sustainability of the Go-Ethereum ecosystem.

This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png
This image has an empty alt attribute; its file name is attacksafe-software-logo-1024x213.png