{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T16:49:26.404","vulnerabilities":[{"cve":{"id":"CVE-2024-21502","sourceIdentifier":"report@snyk.io","published":"2024-02-24T05:15:44.643","lastModified":"2025-02-12T18:49:07.160","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Variable on the stack, via the curvemath_mul function in src/curveMath.c, due to being used and interpreted as user-defined type. Depending on the variable's actual value it could be arbitrary free(), arbitrary realloc(), null pointer dereference and other. Since the stack can be controlled by the attacker, the vulnerability could be used to corrupt allocator structure, leading to possible heap exploitation. The attacker could cause denial of service by exploiting this vulnerability."},{"lang":"es","value":"Las versiones del paquete fastecdsa anteriores a la 2.3.2 son vulnerables al uso de variables no inicializadas en la pila, a través de la función curvemath_mul en src/curveMath.c, debido a que se usan e interpretan como un tipo definido por el usuario. Dependiendo del valor real de la variable, podría ser free() arbitrario, realloc() arbitrario, desreferencia de puntero nulo y otros. Dado que el atacante puede controlar la pila, la vulnerabilidad podría usarse para corromper la estructura del asignador, lo que llevaría a una posible explotación del montón. El atacante podría provocar una denegación de servicio aprovechando esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"report@snyk.io","type":"Secondary","description":[{"lang":"en","value":"CWE-457"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-908"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:antonkueltz:fastecdsa:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.2","matchCriteriaId":"AC53779B-A4F3-4862-A23A-A75226BBA659"}]}]}],"references":[{"url":"https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/AntonKueltz/fastecdsa/blob/v2.3.1/src/curveMath.c%23L210","source":"report@snyk.io","tags":["Broken Link"]},{"url":"https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36","source":"report@snyk.io","tags":["Patch"]},{"url":"https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://gist.github.com/keltecc/49da037072276f21b005a8337c15db26","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/AntonKueltz/fastecdsa/blob/v2.3.1/src/curveMath.c%23L210","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://github.com/AntonKueltz/fastecdsa/commit/57fc5689c95d649dab7ef60cc99ac64589f01e36","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://security.snyk.io/vuln/SNYK-PYTHON-FASTECDSA-6262045","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}