CVE-2018-6459
Gentoo Linux Security Advisory 201811-16
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
La función rsa_pss_params_parse en libstrongswan/credentials/keys/signature_params.c en strong permite que atacantes remotos provoquen una denegación de servicio (DoS) mediante una firma RSASSA-PSS manipulada que carece de un parámetro de función de generación de máscaras.
An update that fixes one vulnerability is now available. This update for strongswan fixes the following issues. Strongswan was updated to version 5.8.2. Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS signatures that was caused by insufficient input validation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-01-31 CVE Reserved
- 2018-02-20 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.strongswan.org/blog/2018/02/19/strongswan-vulnerability-%28cve-2018-6459%29.html | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html | 2023-11-07 | |
https://security.gentoo.org/glsa/201811-16 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 5.6.1 Search vendor "Strongswan" for product "Strongswan" and version "5.6.1" | - |
Affected
|