Bug 1109972 (CVE-2018-15836) - VUL-1: CVE-2018-15836: openswan: IKEv2 signature verification is vulnerable to "Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures" attacks when RAW RSA keys are used
Summary: VUL-1: CVE-2018-15836: openswan: IKEv2 signature verification is vulnerable t...
Status: RESOLVED WONTFIX
Alias: CVE-2018-15836
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/215751/
Whiteboard: CVSSv3:SUSE:CVE-2018-15836:5.6:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2018-09-27 09:17 UTC by Karol Babioch
Modified: 2024-05-08 13:54 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Karol Babioch 2018-09-27 09:17:34 UTC
In Openswan before 2.6.50.1, IKEv2 signature verification is vulnerable to
"Variants of Bleichenbacher's Low-Exponent Attack on PKCS#1 RSA Signatures"
attacks when RAW RSA keys are used.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-15836
https://lists.openswan.org/pipermail/users/2018-August/023761.html
https://github.com/xelerance/Openswan/commit/0b460be9e287fd335c8ce58129c67bf06065ef51
Comment 2 Karol Babioch 2018-09-27 09:23:40 UTC
Upstream has changed the code quite a bit, especially with upstream commit 19fb775019.