OpenSSL prior to 0.9.7, 0.9.7 prior to 0.9.7k, and 0.9.8 prior to 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote malicious users to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.7f |
||
openssl openssl 0.9.7g |
||
openssl openssl |
||
openssl openssl 0.9.6g |
||
openssl openssl 0.9.6j |
||
openssl openssl 0.9.6l |
||
openssl openssl 0.9.6 |
||
openssl openssl 0.9.4 |
||
openssl openssl 0.9.5 |
||
openssl openssl 0.9.7a |
||
openssl openssl 0.9.7h |
||
openssl openssl 0.9.7i |
||
openssl openssl 0.9.6f |
||
openssl openssl 0.9.6i |
||
openssl openssl 0.9.6h |
||
openssl openssl 0.9.5a |
||
openssl openssl 0.9.6b |
||
openssl openssl 0.9.3 |
||
openssl openssl 0.9.2b |
||
openssl openssl 0.9.7d |
||
openssl openssl 0.9.7e |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.6d |
||
openssl openssl 0.9.6k |
||
openssl openssl 0.9.6a |
||
openssl openssl 0.9.3a |
||
openssl openssl 0.9.7b |
||
openssl openssl 0.9.7c |
||
openssl openssl 0.9.7j |
||
openssl openssl 0.9.8 |
||
openssl openssl 0.9.6c |
||
openssl openssl 0.9.6e |
||
openssl openssl 0.9.1c |
||
openssl openssl 0.9.6m |