Описание
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4790
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28953
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937
- http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html
- http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html
- http://secunia.com/advisories/21937
- http://secunia.com/advisories/21942
- http://secunia.com/advisories/21973
- http://secunia.com/advisories/22049
- http://secunia.com/advisories/22080
- http://secunia.com/advisories/22084
- http://secunia.com/advisories/22097
- http://secunia.com/advisories/22226
- http://secunia.com/advisories/22992
- http://secunia.com/advisories/25762
- http://security.gentoo.org/glsa/glsa-200609-15.xml
- http://securitytracker.com/id?1016844
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
- http://www.debian.org/security/2006/dsa-1182
- http://www.gnu.org/software/gnutls/security.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:166
- http://www.novell.com/linux/security/advisories/2006_23_sr.html
- http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html
- http://www.redhat.com/support/errata/RHSA-2006-0680.html
- http://www.securityfocus.com/bid/20027
- http://www.ubuntu.com/usn/usn-348-1
- http://www.vupen.com/english/advisories/2006/3635
- http://www.vupen.com/english/advisories/2006/3899
- http://www.vupen.com/english/advisories/2007/2289
EPSS
CVE ID
Связанные уязвимости
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3 ...
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить целостность защищаемой информации
EPSS