In verifysignedhash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification is affected when RAW RSA keys are used.
[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2018-15836-1ac51d67",
"digest": {
"length": 900.0,
"function_hash": "236529740792023782679289609660264815960"
},
"source": "https://github.com/xelerance/openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d",
"signature_version": "v1",
"target": {
"function": "verify_signed_hash",
"file": "lib/liboswkeys/signatures.c"
}
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2018-15836-2d94594d",
"digest": {
"line_hashes": [
"257282234818150788343041657178393295120",
"142560450995371773859260608519618091601",
"96950459911695153985521605877857233650",
"81033830470151624835191227279492282264"
],
"threshold": 0.9
},
"source": "https://github.com/xelerance/openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d",
"signature_version": "v1",
"target": {
"file": "lib/liboswkeys/signatures.c"
}
}
]