Vulnerability Details CVE-2018-16152
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 78.2%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-16152
-
cpe:2.3:a:strongswan:strongswan:4.0.0
-
cpe:2.3:a:strongswan:strongswan:4.0.1
-
cpe:2.3:a:strongswan:strongswan:4.0.2
-
cpe:2.3:a:strongswan:strongswan:4.0.3
-
cpe:2.3:a:strongswan:strongswan:4.0.4
-
cpe:2.3:a:strongswan:strongswan:4.0.5
-
cpe:2.3:a:strongswan:strongswan:4.0.6
-
cpe:2.3:a:strongswan:strongswan:4.0.7
-
cpe:2.3:a:strongswan:strongswan:4.1.0
-
cpe:2.3:a:strongswan:strongswan:4.1.1
-
cpe:2.3:a:strongswan:strongswan:4.1.10
-
cpe:2.3:a:strongswan:strongswan:4.1.11
-
cpe:2.3:a:strongswan:strongswan:4.1.2
-
cpe:2.3:a:strongswan:strongswan:4.1.3
-
cpe:2.3:a:strongswan:strongswan:4.1.4
-
cpe:2.3:a:strongswan:strongswan:4.1.5
-
cpe:2.3:a:strongswan:strongswan:4.1.6
-
cpe:2.3:a:strongswan:strongswan:4.1.7
-
cpe:2.3:a:strongswan:strongswan:4.1.8
-
cpe:2.3:a:strongswan:strongswan:4.1.9
-
cpe:2.3:a:strongswan:strongswan:4.2.0
-
cpe:2.3:a:strongswan:strongswan:4.2.1
-
cpe:2.3:a:strongswan:strongswan:4.2.10
-
cpe:2.3:a:strongswan:strongswan:4.2.11
-
cpe:2.3:a:strongswan:strongswan:4.2.12
-
cpe:2.3:a:strongswan:strongswan:4.2.13
-
cpe:2.3:a:strongswan:strongswan:4.2.14
-
cpe:2.3:a:strongswan:strongswan:4.2.15
-
cpe:2.3:a:strongswan:strongswan:4.2.16
-
cpe:2.3:a:strongswan:strongswan:4.2.2
-
cpe:2.3:a:strongswan:strongswan:4.2.3
-
cpe:2.3:a:strongswan:strongswan:4.2.4
-
cpe:2.3:a:strongswan:strongswan:4.2.5
-
cpe:2.3:a:strongswan:strongswan:4.2.6
-
cpe:2.3:a:strongswan:strongswan:4.2.7
-
cpe:2.3:a:strongswan:strongswan:4.2.8
-
cpe:2.3:a:strongswan:strongswan:4.2.9
-
cpe:2.3:a:strongswan:strongswan:4.3.0
-
cpe:2.3:a:strongswan:strongswan:4.3.1
-
cpe:2.3:a:strongswan:strongswan:4.3.2
-
cpe:2.3:a:strongswan:strongswan:4.3.3
-
cpe:2.3:a:strongswan:strongswan:4.3.4
-
cpe:2.3:a:strongswan:strongswan:4.3.5
-
cpe:2.3:a:strongswan:strongswan:4.3.6
-
cpe:2.3:a:strongswan:strongswan:4.3.7
-
cpe:2.3:a:strongswan:strongswan:4.4.0
-
cpe:2.3:a:strongswan:strongswan:4.4.1
-
cpe:2.3:a:strongswan:strongswan:4.5.0
-
cpe:2.3:a:strongswan:strongswan:4.5.1
-
cpe:2.3:a:strongswan:strongswan:4.5.2
-
cpe:2.3:a:strongswan:strongswan:4.5.3
-
cpe:2.3:a:strongswan:strongswan:4.6.0
-
cpe:2.3:a:strongswan:strongswan:4.6.1
-
cpe:2.3:a:strongswan:strongswan:4.6.2
-
cpe:2.3:a:strongswan:strongswan:4.6.3
-
cpe:2.3:a:strongswan:strongswan:4.6.4
-
cpe:2.3:a:strongswan:strongswan:5.0.0
-
cpe:2.3:a:strongswan:strongswan:5.0.1
-
cpe:2.3:a:strongswan:strongswan:5.0.2
-
cpe:2.3:a:strongswan:strongswan:5.0.3
-
cpe:2.3:a:strongswan:strongswan:5.0.4
-
cpe:2.3:a:strongswan:strongswan:5.1.0
-
cpe:2.3:a:strongswan:strongswan:5.1.1
-
cpe:2.3:a:strongswan:strongswan:5.1.2
-
cpe:2.3:a:strongswan:strongswan:5.1.3
-
cpe:2.3:a:strongswan:strongswan:5.2.0
-
cpe:2.3:a:strongswan:strongswan:5.2.1
-
cpe:2.3:a:strongswan:strongswan:5.2.2
-
cpe:2.3:a:strongswan:strongswan:5.2.3
-
cpe:2.3:a:strongswan:strongswan:5.3.0
-
cpe:2.3:a:strongswan:strongswan:5.3.1
-
cpe:2.3:a:strongswan:strongswan:5.3.2
-
cpe:2.3:a:strongswan:strongswan:5.3.3
-
cpe:2.3:a:strongswan:strongswan:5.3.4
-
cpe:2.3:a:strongswan:strongswan:5.3.5
-
cpe:2.3:a:strongswan:strongswan:5.4.0
-
cpe:2.3:a:strongswan:strongswan:5.5.0
-
cpe:2.3:a:strongswan:strongswan:5.5.1
-
cpe:2.3:a:strongswan:strongswan:5.5.2
-
cpe:2.3:a:strongswan:strongswan:5.5.3
-
cpe:2.3:a:strongswan:strongswan:5.6.0
-
cpe:2.3:a:strongswan:strongswan:5.6.1
-
cpe:2.3:a:strongswan:strongswan:5.6.2
-
cpe:2.3:a:strongswan:strongswan:5.6.3
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0