CVE-2016-6129
Publication date 13 February 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
From the Ubuntu Security Team
It was discovered that LibTomCrypt incorrectly handled RSA signatures or public certificates. An attacker could possibly use this issue to make a Bleichenbacher signature forgery attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
libtomcrypt | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Fixed 1.17-7ubuntu0.1
|
|
14.04 LTS trusty |
Fixed 1.17-5ubuntu0.1
|
|
Notes
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |