CVE-2018-16152 (retired)

Priority
Description
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin
in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP
does not reject excess data in the digestAlgorithm.parameters field during
PKCS#1 v1.5 signature verification. Consequently, a remote attacker can
forge signatures when small public exponents are being used, which could
lead to impersonation when only an RSA signature is used for IKEv2
authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (5.1.2-0ubuntu2.10)
Ubuntu 16.04 LTS (Xenial Xerus):released (5.3.5-1ubuntu3.7)
Ubuntu 18.04 LTS (Bionic Beaver):released (5.6.2-1ubuntu2.2)
Ubuntu 18.10 (Cosmic Cuttlefish):released (5.6.3-1ubuntu3)
More Information

Updated: 2019-03-26 12:27:10 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)