First published: Tue Feb 20 2018(Updated: )
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | =5.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
<CVE-2018-6459>
The severity of <CVE-2018-6459> is medium with a severity value of 5.3.
The version affected by <CVE-2018-6459> is Strongswan 5.6.1.
An attacker can exploit <CVE-2018-6459> by sending a crafted RSASSA-PSS signature that lacks a mask generation function parameter, causing a denial of service.
Yes, the references for <CVE-2018-6459> are: [1] http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html, [2] https://security.gentoo.org/glsa/201811-16, [3] https://www.strongswan.org/blog/2018/02/19/strongswan-vulnerability-(cve-2018-6459).html