Логотип exploitDog
bind:CVE-2018-16149
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16149

Количество 3

Количество 3

nvd логотип

CVE-2018-16149

больше 7 лет назад

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-16149

больше 7 лет назад

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS# ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-9955-wg6r-ggm9

больше 3 лет назад

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-16149

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-16149

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS# ...

CVSS3: 5.9
1%
Низкий
больше 7 лет назад
github логотип
GHSA-9955-wg6r-ggm9

In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification blindly trusts the declared lengths in the ASN.1 structure. Consequently, when small public exponents are being used, a remote attacker can generate purposefully crafted signatures (and put them on X.509 certificates) to induce illegal memory access and crash the verifier.

CVSS3: 5.9
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу