CVE-2018-6459Improper Verification of Cryptographic Signature in Strongswan

Severity
5.3MEDIUMNVD
EPSS
0.2%
top 54.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 20
Latest updateMay 13

Description

The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

debiandebian/strongswan< strongswan 5.6.2-1 (bookworm)
Debianstrongswan/strongswan< 5.6.2-1+3

🔴Vulnerability Details

2
GHSA
GHSA-66xj-v6xw-92v4: The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params2022-05-13
OSV
CVE-2018-6459: The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params2018-02-20

📋Vendor Advisories

2
Red Hat
strongswan: Insufficient Input Validation in RSASSA-PSS Signature Parser2018-02-19
Debian
CVE-2018-6459: strongswan - The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_pa...2018

💬Community

3
Bugzilla
CVE-2018-6459 strongswan: Insufficient Input Validation in RSASSA-PSS Signature Parser2018-02-21
Bugzilla
CVE-2018-6459 strongswan: Insufficient Input Validation in RSASSA-PSS Signature Parser [epel-all]2018-02-21
Bugzilla
CVE-2018-6459 strongswan: Insufficient Input Validation in RSASSA-PSS Signature Parser [fedora-all]2018-02-21