CVE-2018-16151

Priority
Description
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin
in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP
does not reject excess data after the encoded algorithm OID during PKCS#1
v1.5 signature verification. Similar to the flaw in the same version of
strongSwan regarding digestAlgorithm.parameters, a remote attacker can
forge signatures when small public exponents are being used, which could
lead to impersonation when only an RSA signature is used for IKEv2
authentication.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (5.1.2-0ubuntu2.10)
Ubuntu 16.04 LTS (Xenial Xerus):released (5.3.5-1ubuntu3.7)
Ubuntu 18.04 LTS (Bionic Beaver):released (5.6.2-1ubuntu2.2)
More Information

Updated: 2020-01-29 20:02:26 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)