Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6129

Опубликовано: 26 авг. 2016
Источник: redhat
CVSS3: 4.8
CVSS2: 4
EPSS Низкий

Описание

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7libtomcryptNot affected
Red Hat Virtualization 4libtomcryptNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1370955libtomcrypt: possible OP-TEE Bleichenbacher attack

EPSS

Процентиль: 35%
0.00145
Низкий

4.8 Medium

CVSS3

4 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

CVSS3: 7.5
nvd
почти 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

CVSS3: 7.5
debian
почти 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, a ...

EPSS

Процентиль: 35%
0.00145
Низкий

4.8 Medium

CVSS3

4 Medium

CVSS2