Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-16152

Опубликовано: 26 сент. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 5
CVSS3: 7.5

Описание

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

РелизСтатусПримечание
bionic

released

5.6.2-1ubuntu2.2
devel

released

5.6.3-1ubuntu3
esm-infra-legacy/trusty

released

5.1.2-0ubuntu2.10
esm-infra/bionic

released

5.6.2-1ubuntu2.2
esm-infra/xenial

released

5.3.5-1ubuntu3.7
precise/esm

DNE

trusty

released

5.1.2-0ubuntu2.10
trusty/esm

released

5.1.2-0ubuntu2.10
upstream

needs-triage

xenial

released

5.3.5-1ubuntu3.7

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.6
redhat
больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
nvd
больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
debian
больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp pl ...

CVSS3: 7.5
github
больше 3 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

suse-cvrf
почти 4 года назад

Security update for strongswan

5 Medium

CVSS2

7.5 High

CVSS3