|
10 | 10 | "notes" : {
|
11 | 11 | "ArithmeticError" : {
|
12 | 12 | "bugType" : "EDGE_CASE",
|
13 |
| - "description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurences.", |
| 13 | + "description" : "Some implementations of ECDSA have arithmetic errors that occur when intermediate results have extreme values. This test vector has been constructed to test such occurrences.", |
14 | 14 | "cves" : [
|
15 | 15 | "CVE-2017-18146"
|
16 | 16 | ]
|
|
47 | 47 | "InvalidSignature" : {
|
48 | 48 | "bugType" : "AUTH_BYPASS",
|
49 | 49 | "description" : "The signature contains special case values such as r=0 and s=0. Buggy implementations may accept such values, if the implementation does not check boundaries and computes s^(-1) == 0.",
|
50 |
| - "effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.", |
| 50 | + "effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.", |
51 | 51 | "cves" : [
|
52 | 52 | "CVE-2022-21449",
|
53 | 53 | "CVE-2021-43572",
|
|
57 | 57 | "InvalidTypesInSignature" : {
|
58 | 58 | "bugType" : "AUTH_BYPASS",
|
59 | 59 | "description" : "The signature contains invalid types. Dynamic typed languages sometime coerce such values of different types into integers. If an implementation is careless and has additional bugs, such as not checking integer boundaries then it may be possible that such signatures are accepted.",
|
60 |
| - "effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowning the message to sign.", |
| 60 | + "effect" : "Accepting such signatures can have the effect that an adversary can forge signatures without even knowing the message to sign.", |
61 | 61 | "cves" : [
|
62 | 62 | "CVE-2022-21449"
|
63 | 63 | ]
|
|
95 | 95 | },
|
96 | 96 | "SignatureMalleabilityBitcoin" : {
|
97 | 97 | "bugType" : "SIGNATURE_MALLEABILITY",
|
98 |
| - "description" : "\"BitCoins\"-curves are curves where signature malleability can be a serious issue. An implementation should only accept a signature s where s < n/2. If an implementation is not meant for uses cases that require signature malleability then this implemenation should be tested with another set of test vectors.", |
| 98 | + "description" : "\"BitCoins\"-curves are curves where signature malleability can be a serious issue. An implementation should only accept a signature s where s < n/2. If an implementation is not meant for uses cases that require signature malleability then this implementation should be tested with another set of test vectors.", |
99 | 99 | "effect" : "In bitcoin exchanges, it may be used to make a double deposits or double withdrawals",
|
100 | 100 | "links" : [
|
101 | 101 | "https://en.bitcoin.it/wiki/Transaction_malleability",
|
|
0 commit comments