Libtomcrypt vulnerabilities

5 known vulnerabilities affecting libtomcrypt/libtomcrypt.

Total CVEs
5
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2019-17362CRITICALCVSS 9.1≥ 0, < 1.18.2-32019-10-09
CVE-2019-17362 [CRITICAL] CVE-2019-17362: In LibTomCrypt through 1 In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
osv
CVE-2018-12437MEDIUMCVSS 4.9≥ 0, < 1.18.2-12018-06-15
CVE-2018-12437 [MEDIUM] CVE-2018-12437: LibTomCrypt through 1 LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
osv
CVE-2018-0739MEDIUMCVSS 6.5≥ 0, < 1.18.2-12018-03-27
CVE-2018-0739 [MEDIUM] CVE-2018-0739: Constructed ASN Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
osv
CVE-2016-6129HIGHCVSS 7.5≥ 0, < 1.17-82017-02-13
CVE-2016-6129 [HIGH] CVE-2016-6129: The rsa_verify_hash_ex function in rsa_verify_hash The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
osv
CVE-2005-1600HIGHCVSS 7.5v1.0v1.0.1+1 more2005-05-16
CVE-2005-1600 [HIGH] CVE-2005-1600: A "mathematical flaw" in the implementation of the El Gamal signature algorithm for LibTomCrypt 1.0 A "mathematical flaw" in the implementation of the El Gamal signature algorithm for LibTomCrypt 1.0 to 1.0.2 allows attackers to generate valid signatures without having the private key.
nvd