ALPINE-CVE-2018-16152 PUBLISHED CVSS 7.5 HIGH

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

Risk Scores

CVSS v3.0
7.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products

VendorProductVersions
Alpine:v3.23strongswan4.6.1-r0, 5.1.1-r0, 5.1.1-r2
Alpine:v3.22strongswan5.3.5-r2, 0, 4.5.2-r0
Alpine:v3.20strongswan5.6.3-r1, 5.5.2-r0, 5.6.3-r2
Alpine:v3.11strongswan5.3.2-r5, 0, 4.5.2-r0
Alpine:v3.12strongswan5.6.3-r2, 5.6.3-r1, 5.6.3-r0
Alpine:v3.5strongswan0, 4.5.2-r0, 4.6.1-r0
Alpine:v3.16strongswan5.6.1-r0, 0, 4.5.2-r0
Alpine:v3.14strongswan5.6.3-r2, 5.6.0-r0, 5.6.1-r0
Alpine:v3.18strongswan5.1.1-r2, 5.1.1-r3, 5.2.0-r0
Alpine:v3.13strongswan5.2.0-r1, 5.1.3-r0, 5.1.1-r3
Alpine:v3.19strongswan5.3.0-r0, 5.3.0-r1, 5.3.0-r2
Alpine:v3.21strongswan5.3.2-r1, 0, 4.5.2-r0
Alpine:v3.15strongswan5.6.1-r0, 5.6.2-r0, 5.6.2-r1
Alpine:v3.8strongswan5.3.1-r1, 5.6.3-r1, 5.6.3-r0
Alpine:v3.6strongswan5.2.0-r0, 5.3.2-r2, 5.3.2-r5
Alpine:v3.9strongswan5.2.0-r2, 5.2.2-r0, 5.3.0-r1
Alpine:v3.10strongswan5.3.2-r7, 5.5.2-r1, 5.5.1-r0
Alpine:v3.7strongswan4.6.1-r0, 0, 4.5.2-r0
Alpine:v3.17strongswan4.6.1-r0, 5.6.3-r2, 5.6.3-r1

Timeline

References

Open in Interactive Console →