CVE-2018-16152 PUBLISHED

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.

EPSS 1.69% · 82.1th percentile

Risk Scores

EPSS Score
1.69%
82.1th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSstrongswan0, 5.5.1-4ubuntu2, 5.5.1-4ubuntu3
Ubuntu:16.04:LTSstrongswan5.3.5-1ubuntu3.2, 5.3.5-1ubuntu3.3, 0
Ubuntu:14.04:LTSstrongswan5.1.2-0ubuntu2.3, 5.1.2-0ubuntu2.4, 5.1.2-0ubuntu2.5

Timeline

References

Open in Interactive Console →