Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-6129

Опубликовано: 13 фев. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.17-8
devel

not-affected

1.17-8
esm-apps/bionic

not-affected

1.17-8
esm-apps/xenial

released

1.17-7ubuntu0.1
esm-infra-legacy/trusty

released

1.17-5ubuntu0.1
precise

released

1.17-3.2+deb7u1ubuntu0.1
precise/esm

DNE

precise was released [1.17-3.2+deb7u1ubuntu0.1]
trusty

released

1.17-5ubuntu0.1
trusty/esm

released

1.17-5ubuntu0.1

Показывать по

EPSS

Процентиль: 35%
0.00145
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
больше 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

CVSS3: 7.5
nvd
почти 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.

CVSS3: 7.5
debian
почти 9 лет назад

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, a ...

EPSS

Процентиль: 35%
0.00145
Низкий

5 Medium

CVSS2

7.5 High

CVSS3