{"id":"CVE-2018-16152","details":"In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.","modified":"2026-04-10T04:06:43.092979Z","published":"2018-09-26T21:29:01.197Z","related":["SUSE-SU-2019:3056-1","SUSE-SU-2019:3266-1","SUSE-SU-2022:14887-1","openSUSE-SU-2019:2594-1","openSUSE-SU-2019:2598-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00032.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201811-16"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3771-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4305"},{"type":"ARTICLE","url":"https://www.strongswan.org/blog/2018/09/24/strongswan-vulnerability-%28cve-2018-16151%2C-cve-2018-16152%29.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/strongswan/strongswan","events":[{"introduced":"8ba0404004ae9b36d74598a3f2212973fffb343a"},{"last_affected":"b3bb991dc93324f52f52216d5a1460a865016c76"},{"introduced":"1e5634c9b3eaad5231ad4a90c394c5589fb2a387"},{"fixed":"2a327d438ce526b078fb1e93402c7394a78c408c"}],"database_specific":{"versions":[{"introduced":"4.0.0"},{"last_affected":"4.6.4"},{"introduced":"5.0.0"},{"fixed":"5.7.0"}]}}],"versions":["4.0.0","4.0.1","4.0.2","4.0.3","4.0.4","4.0.5","4.0.6","4.0.7","4.1.0","4.1.1","4.1.10","4.1.11","4.1.2","4.1.3","4.1.4","4.1.5","4.1.6","4.1.7","4.1.8","4.1.9","4.2.0","4.2.1","4.2.10","4.2.11","4.2.12","4.2.13","4.2.14","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.2.8","4.2.9","4.3.0","4.3.1","4.3.2","4.3.3","4.3.4","4.3.5","4.3.5rc1","4.3.6","4.4.0","4.4.1","4.5.0","4.5.1","4.5.2","4.5.3","4.6.0","4.6.1","4.6.2","4.6.3","4.6.4","5.0.0","5.0.1","5.0.2","5.0.2dr4","5.0.2rc1","5.0.3","5.0.3dr1","5.0.3dr2","5.0.3dr3","5.0.3rc1","5.0.4","5.1.0","5.1.0dr1","5.1.0dr2","5.1.0rc1","5.1.1","5.1.1dr1","5.1.1dr2","5.1.1dr3","5.1.1dr4","5.1.1rc1","5.1.2","5.1.2.dr2","5.1.2dr1","5.1.2dr3","5.1.2rc1","5.1.2rc2","5.1.3","5.1.3dr1","5.1.3rc1","5.2.0","5.2.0dr1","5.2.0dr2","5.2.0dr3","5.2.0dr4","5.2.0dr5","5.2.0dr6","5.2.0rc1","5.2.1","5.2.1dr1","5.2.1rc1","5.2.2","5.2.2dr1","5.2.2rc1","5.3.0","5.3.0dr1","5.3.0rc1","5.3.1","5.3.1dr1","5.3.1rc1","5.3.2","5.3.3","5.3.3dr1","5.3.3dr3","5.3.3dr4","5.3.3dr5","5.3.3dr6","5.3.3rc2","5.3.4","5.3.4dr1","5.3.4dr2","5.3.4dr3","5.3.4rc1","5.3.5","5.4.0","5.4.0dr1","5.4.0dr2","5.4.0dr3","5.4.0dr4","5.4.0dr5","5.4.0dr6","5.4.0dr7","5.4.0dr8","5.4.0rc1","5.4.1dr1","5.4.1dr2","5.4.1dr3","5.4.1dr4","5.5.0","5.5.0dr1","5.5.0rc1","5.5.1","5.5.1dr1","5.5.1dr2","5.5.1dr3","5.5.1dr4","5.5.1dr5","5.5.1rc1","5.5.1rc2","5.5.2","5.5.2dr1","5.5.2dr2","5.5.2dr3","5.5.2dr4","5.5.2dr5","5.5.2dr6","5.5.2dr7","5.5.2rc1","5.5.3","5.5.3dr1","5.5.3dr2","5.6.0","5.6.0dr1","5.6.0dr2","5.6.0dr3","5.6.0dr4","5.6.0rc1","5.6.0rc2","5.6.1","5.6.1dr1","5.6.1dr2","5.6.1dr3","5.6.1rc1","5.6.2","5.6.2dr1","5.6.2dr2","5.6.2dr3","5.6.2dr4","5.6.2rc1","5.6.3","5.6.3dr1","5.6.3dr2","5.6.3rc1","5.7.0dr1","5.7.0dr2","5.7.0dr3","5.7.0dr4","5.7.0dr5","5.7.0dr6","5.7.0dr8","5.7.0rc1","5.7.0rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16152.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}