CVE-2016-6129
 
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
La función rsa_verify_hash_ex en rsa_verify_hash.c en LibTomCrypt, como se utiliza en OP-TEE en versiones anteriores a 2.2.0, no valida que la longitud del mensaje es igual a la longitud de datos codificados en ASN.1, lo que facilita a atacantes remotos falsificar firmas RSA o certificados públicos aprovechando un ataque de falsificación de firma de Bleichenbacher.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2016-06-30 CVE Reserved
- 2017-02-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1370955 | 2017-03-13 | |
https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0 | 2017-03-13 |
URL | Date | SRC |
---|---|---|
https://www.op-tee.org/advisories | 2017-03-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Op-tee Search vendor "Op-tee" | Op-tee Os Search vendor "Op-tee" for product "Op-tee Os" | <= 2.1.0 Search vendor "Op-tee" for product "Op-tee Os" and version " <= 2.1.0" | - |
Affected
| ||||||
Libtom Search vendor "Libtom" | Libtomcrypt Search vendor "Libtom" for product "Libtomcrypt" | <= 1.17 Search vendor "Libtom" for product "Libtomcrypt" and version " <= 1.17" | - |
Affected
|