CVE-2016-6129

Public on 2017-02-13
Modified on 2017-08-04
Description
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.8
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 1 libtomcrypt 2017-08-03 ALAS-2017-864 Fixed
HAQM Linux 1 libtommath 2017-08-03 ALAS-2017-864 Fixed

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv2 4.0 AV:N/AC:H/Au:N/C:P/I:P/A:N
HAQM Linux CVSSv3 4.8 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
NVD CVSSv2 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
NVD CVSSv3 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N