First published: Wed Sep 26 2018(Updated: )
In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xelerance Openswan | <2.6.50.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15836 is a vulnerability in Openswan before version 2.6.50.1 that allows a remote attacker to forge signatures using small public exponents.
CVE-2018-15836 has a severity score of 7.5 (high).
The affected software is Xelerance Openswan version up to 2.6.50.1.
To fix CVE-2018-15836, upgrade to version 2.6.50.1 or later of Xelerance Openswan.
For more information about CVE-2018-15836, you can refer to the following links: [Link 1](https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51), [Link 2](https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d), [Link 3](https://lists.openswan.org/pipermail/users/2018-August/023761.html).