CVE-2018-16152

Priority
Description
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin
in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP
does not reject excess data in the digestAlgorithm.parameters field during
PKCS#1 v1.5 signature verification. Consequently, a remote attacker can
forge signatures when small public exponents are being used, which could
lead to impersonation when only an RSA signature is used for IKEv2
authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (5.1.2-0ubuntu2.10)
Ubuntu 16.04 LTS (Xenial Xerus):released (5.3.5-1ubuntu3.7)
Ubuntu 18.04 LTS (Bionic Beaver):released (5.6.2-1ubuntu2.2)
More Information

Updated: 2020-07-28 20:04:13 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)