Логотип exploitDog
bind:CVE-2018-16151
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16151

Количество 11

Количество 11

ubuntu логотип

CVE-2018-16151

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-16151

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2018-16151

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-16151

больше 7 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp pl ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6w9w-qmvw-3v7q

больше 3 лет назад

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2020-01851

больше 7 лет назад

Уязвимость функции verify_emsa_pkcs1_signature() плагина gmp IPSEC демона strongSwan, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:14887-1

почти 4 года назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2598-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:2594-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3266-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3056-1

около 6 лет назад

Security update for strongswan

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16151

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-16151

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 5.6
2%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-16151

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-16151

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp pl ...

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
github логотип
GHSA-6w9w-qmvw-3v7q

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01851

Уязвимость функции verify_emsa_pkcs1_signature() плагина gmp IPSEC демона strongSwan, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.5
2%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2022:14887-1

Security update for strongswan

почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2019:2598-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:2594-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3266-1

Security update for strongswan

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3056-1

Security update for strongswan

около 6 лет назад

Уязвимостей на страницу