4.3
CVSSv2

CVE-2006-4339

Published: 05/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

OpenSSL prior to 0.9.7, 0.9.7 prior to 0.9.7k, and 0.9.8 prior to 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote malicious users to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.7f

openssl openssl 0.9.7g

openssl openssl

openssl openssl 0.9.6g

openssl openssl 0.9.6j

openssl openssl 0.9.6l

openssl openssl 0.9.6

openssl openssl 0.9.4

openssl openssl 0.9.5

openssl openssl 0.9.7a

openssl openssl 0.9.7h

openssl openssl 0.9.7i

openssl openssl 0.9.6f

openssl openssl 0.9.6i

openssl openssl 0.9.6h

openssl openssl 0.9.5a

openssl openssl 0.9.6b

openssl openssl 0.9.3

openssl openssl 0.9.2b

openssl openssl 0.9.7d

openssl openssl 0.9.7e

openssl openssl 0.9.8a

openssl openssl 0.9.8b

openssl openssl 0.9.6d

openssl openssl 0.9.6k

openssl openssl 0.9.6a

openssl openssl 0.9.3a

openssl openssl 0.9.7b

openssl openssl 0.9.7c

openssl openssl 0.9.7j

openssl openssl 0.9.8

openssl openssl 0.9.6c

openssl openssl 0.9.6e

openssl openssl 0.9.1c

openssl openssl 0.9.6m

Vendor Advisories

Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of Google Security discovered that the OpenSSL library did not sufficiently check the padding of PKCS #1 v15 signatures if the exponent of the public key is 3 (which is widely used for CAs) This could be exploited to forge signatures without the need of the secret key ...
Daniel Bleichenbacher discovered a flaw in the OpenSSL cryptographic package that could allow an attacker to generate a forged signature that OpenSSL will accept as valid For the stable distribution (sarge) this problem has been fixed in version 096m-1sarge2 This package exists only for compatibility with older software, and is not present in t ...
Daniel Bleichenbacher discovered a flaw in the OpenSSL cryptographic package that could allow an attacker to generate a forged signature that OpenSSL will accept as valid For the stable distribution (sarge) this problem has been fixed in version 097e-3sarge2 For the unstable distribution (sid) this problem has been fixed in version 098b-3 We ...
Mozilla Foundation Security Advisory 2006-60 RSA Signature Forgery Announced September 14, 2006 Reporter Philip Mackenzie, Marius Schilder Impact Critical Products Firefox, NSS, SeaMonkey, Thunderbird Fixed in ...

References

CWE-310http://www.imc.org/ietf-openpgp/mail-archive/msg14307.htmlhttp://www.openssl.org/news/secadv_20060905.txthttp://secunia.com/advisories/21709http://www.ubuntu.com/usn/usn-339-1http://www.securityfocus.com/bid/19849https://issues.rpath.com/browse/RPL-616http://www.us.debian.org/security/2006/dsa-1173http://www.debian.org/security/2006/dsa-1174http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.aschttp://security.gentoo.org/glsa/glsa-200609-05.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:161http://www.openbsd.org/errata.htmlhttp://www.redhat.com/support/errata/RHSA-2006-0661.htmlhttp://www.osvdb.org/28549http://securitytracker.com/id?1016791http://secunia.com/advisories/21778http://secunia.com/advisories/21785http://secunia.com/advisories/21812http://secunia.com/advisories/21823http://secunia.com/advisories/21852http://secunia.com/advisories/21791http://secunia.com/advisories/21767http://secunia.com/advisories/21776http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/http://www.kb.cert.org/vuls/id/845620http://secunia.com/advisories/21873http://secunia.com/advisories/21906http://secunia.com/advisories/21846http://support.avaya.com/elmodocs2/security/ASA-2006-188.htmhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306http://secunia.com/advisories/21927http://secunia.com/advisories/21870ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.aschttp://secunia.com/advisories/22036http://www.opera.com/support/search/supsearch.dml?index=845http://secunia.com/advisories/21982http://security.gentoo.org/glsa/glsa-200609-18.xmlhttp://www.novell.com/linux/security/advisories/2006_55_ssl.htmlhttp://secunia.com/advisories/21930http://secunia.com/advisories/22161http://secunia.com/advisories/22259http://secunia.com/advisories/22260http://openvpn.net/changelog.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1http://secunia.com/advisories/22226http://secunia.com/advisories/22232http://www.serv-u.com/releasenotes/http://secunia.com/advisories/22284http://www.gentoo.org/security/en/glsa/glsa-200610-06.xmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1http://secunia.com/advisories/22325http://secunia.com/advisories/22446http://www.novell.com/linux/security/advisories/2006_61_opera.htmlhttp://secunia.com/advisories/22509http://support.attachmate.com/techdocs/2137.htmlhttp://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.htmlhttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1http://secunia.com/advisories/22513http://secunia.com/advisories/22523http://secunia.com/advisories/22545http://secunia.com/advisories/22585http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdfhttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1http://secunia.com/advisories/22733http://secunia.com/advisories/22671http://secunia.com/advisories/22689http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtmlhttp://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.htmlhttp://secunia.com/advisories/22758http://secunia.com/advisories/22799http://www.sybase.com/detail?id=1047991http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1http://secunia.com/advisories/22711http://secunia.com/advisories/22934http://secunia.com/advisories/22936http://secunia.com/advisories/22937http://secunia.com/advisories/22938http://secunia.com/advisories/22939http://secunia.com/advisories/22940http://secunia.com/advisories/22949http://www.mandriva.com/security/advisories?name=MDKSA-2006:207http://www.novell.com/linux/security/advisories/2006_26_sr.htmlhttp://secunia.com/advisories/22948http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23155http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1http://secunia.com/advisories/23455http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.htmlhttp://www.vmware.com/support/esx21/doc/esx-213-200612-patch.htmlhttp://www.vmware.com/support/esx25/doc/esx-253-200612-patch.htmlhttp://www.vmware.com/support/esx25/doc/esx-254-200612-patch.htmlhttp://www.vmware.com/support/vi3/doc/esx-3069097-patch.htmlhttp://www.vmware.com/support/vi3/doc/esx-9986131-patch.htmlhttp://secunia.com/advisories/23680http://secunia.com/advisories/23794http://support.attachmate.com/techdocs/2127.htmlhttp://support.attachmate.com/techdocs/2128.htmlhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0062.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0072.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0073.htmlhttp://www.novell.com/linux/security/advisories/2007_10_ibmjava.htmlhttp://securitytracker.com/id?1017522http://secunia.com/advisories/23841http://secunia.com/advisories/23915http://secunia.com/advisories/22044http://secunia.com/advisories/22932http://secunia.com/advisories/24099http://secunia.com/advisories/24950http://secunia.com/advisories/24930http://dev2dev.bea.com/pub/advisory/238http://secunia.com/advisories/25284https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.htmlhttps://issues.rpath.com/browse/RPL-1633http://www.mandriva.com/security/advisories?name=MDKSA-2006:177http://www.mandriva.com/security/advisories?name=MDKSA-2006:178http://www.securityfocus.com/bid/22083http://secunia.com/advisories/25399http://secunia.com/advisories/25649http://secunia.com/advisories/22066http://secunia.com/advisories/26329http://secunia.com/advisories/26893http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.htmlhttp://secunia.com/advisories/28115http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1http://lists.vmware.com/pipermail/security-announce/2008/000008.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0005.htmlhttp://www.vmware.com/support/ace2/doc/releasenotes_ace2.htmlhttp://www.vmware.com/support/player/doc/releasenotes_player.htmlhttp://www.vmware.com/support/player2/doc/releasenotes_player2.htmlhttp://www.vmware.com/support/server/doc/releasenotes_server.htmlhttp://www.vmware.com/support/ws55/doc/releasenotes_ws55.htmlhttp://www.vmware.com/support/ws6/doc/releasenotes_ws6.htmlhttp://www.securityfocus.com/bid/28276http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1http://secunia.com/advisories/31492http://www.redhat.com/support/errata/RHSA-2008-0629.htmlhttps://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144http://secunia.com/advisories/38567http://www.openoffice.org/security/cves/CVE-2006-4339.htmlhttp://www.vupen.com/english/advisories/2010/0366http://secunia.com/advisories/38568http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1http://www.vupen.com/english/advisories/2007/2315http://www.vupen.com/english/advisories/2007/2163http://www.vupen.com/english/advisories/2007/1401http://www.vupen.com/english/advisories/2006/4329http://www.vupen.com/english/advisories/2006/3730http://www.vupen.com/english/advisories/2006/3936http://www.vupen.com/english/advisories/2006/3453http://www.vupen.com/english/advisories/2006/4586http://www.vupen.com/english/advisories/2008/0905/referenceshttp://www.vupen.com/english/advisories/2007/1945http://www.vupen.com/english/advisories/2006/4744http://www.vupen.com/english/advisories/2007/1815http://www.vupen.com/english/advisories/2007/0254http://www.vupen.com/english/advisories/2006/4417http://www.vupen.com/english/advisories/2006/3748http://www.vupen.com/english/advisories/2006/4750http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540http://www.vupen.com/english/advisories/2006/3566http://www.vupen.com/english/advisories/2006/5146http://www.vupen.com/english/advisories/2006/3793http://www.vupen.com/english/advisories/2006/4366http://www.vupen.com/english/advisories/2007/4224http://www.vupen.com/english/advisories/2006/4327http://www.vupen.com/english/advisories/2006/4206http://www.vupen.com/english/advisories/2007/0343http://www.vupen.com/english/advisories/2006/4207http://www.vupen.com/english/advisories/2007/2783http://www.vupen.com/english/advisories/2006/4216http://www.vupen.com/english/advisories/2006/3899http://www.vupen.com/english/advisories/2006/4205http://marc.info/?l=bugtraq&m=130497311408250&w=2http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.htmlhttp://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.htmlhttp://jvn.jp/en/jp/JVN51615542/index.htmlhttp://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742http://docs.info.apple.com/article.html?artnum=304829http://docs.info.apple.com/article.html?artnum=307177http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlhttp://secunia.com/advisories/60799http://secunia.com/advisories/41818http://marc.info/?l=bind-announce&m=116253119512445&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/28755https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656http://www.securityfocus.com/archive/1/489739/100/0/threadedhttp://www.securityfocus.com/archive/1/456546/100/200/threadedhttp://www.securityfocus.com/archive/1/450327/100/0/threadedhttp://www.securityfocus.com/archive/1/445822/100/0/threadedhttp://www.securityfocus.com/archive/1/445231/100/0/threadedhttps://usn.ubuntu.com/339-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/845620