Логотип exploitDog
bind:CVE-2018-16152
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16152

Количество 10

Количество 10

ubuntu логотип

CVE-2018-16152

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-16152

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2018-16152

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-16152

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp pl ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-ff5x-x5ch-2x28

больше 3 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:14887-1

почти 4 года назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2598-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2594-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3266-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3056-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16152

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-16152

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 5.6
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-16152

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-16152

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp pl ...

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
github логотип
GHSA-ff5x-x5ch-2x28

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:14887-1

Security update for strongswan

почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2019:2598-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2594-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3266-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3056-1

Security update for strongswan

около 6 лет назад

Уязвимостей на страницу