ghsa-cw9v-mmf8-gmmr
Vulnerability from github
Published
2022-05-03 03:16
Modified
2022-05-03 03:16
Details

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.

Show details on source website


{
   affected: [],
   aliases: [
      "CVE-2006-4339",
   ],
   database_specific: {
      cwe_ids: [],
      github_reviewed: false,
      github_reviewed_at: null,
      nvd_published_at: "2006-09-05T17:04:00Z",
      severity: "MODERATE",
   },
   details: "OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.",
   id: "GHSA-cw9v-mmf8-gmmr",
   modified: "2022-05-03T03:16:24Z",
   published: "2022-05-03T03:16:24Z",
   references: [
      {
         type: "ADVISORY",
         url: "https://nvd.nist.gov/vuln/detail/CVE-2006-4339",
      },
      {
         type: "WEB",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28755",
      },
      {
         type: "WEB",
         url: "https://issues.rpath.com/browse/RPL-1633",
      },
      {
         type: "WEB",
         url: "https://issues.rpath.com/browse/RPL-616",
      },
      {
         type: "WEB",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11656",
      },
      {
         type: "WEB",
         url: "https://secure-support.novell.com/KanisaPlatform/Publishing/41/3143224_f.SAL_Public.html",
      },
      {
         type: "WEB",
         url: "https://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00967144",
      },
      {
         type: "WEB",
         url: "http://dev2dev.bea.com/pub/advisory/238",
      },
      {
         type: "WEB",
         url: "http://docs.info.apple.com/article.html?artnum=304829",
      },
      {
         type: "WEB",
         url: "http://docs.info.apple.com/article.html?artnum=307177",
      },
      {
         type: "WEB",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01070495",
      },
      {
         type: "WEB",
         url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771",
      },
      {
         type: "WEB",
         url: "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540",
      },
      {
         type: "WEB",
         url: "http://jvn.jp/en/jp/JVN51615542/index.html",
      },
      {
         type: "WEB",
         url: "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000079.html",
      },
      {
         type: "WEB",
         url: "http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html",
      },
      {
         type: "WEB",
         url: "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html",
      },
      {
         type: "WEB",
         url: "http://lists.vmware.com/pipermail/security-announce/2008/000008.html",
      },
      {
         type: "WEB",
         url: "http://marc.info/?l=bind-announce&m=116253119512445&w=2",
      },
      {
         type: "WEB",
         url: "http://marc.info/?l=bugtraq&m=130497311408250&w=2",
      },
      {
         type: "WEB",
         url: "http://openvpn.net/changelog.html",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21709",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21767",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21776",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21778",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21785",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21791",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21812",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21823",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21846",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21852",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21870",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21873",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21906",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21927",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21930",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/21982",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22036",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22044",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22066",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22161",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22226",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22232",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22259",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22260",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22284",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22325",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22446",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22509",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22513",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22523",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22545",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22585",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22671",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22689",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22711",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22733",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22758",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22799",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22932",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22934",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22936",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22937",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22938",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22939",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22940",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22948",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/22949",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23155",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23455",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23680",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23794",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23841",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/23915",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/24099",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/24930",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/24950",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/25284",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/25399",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/25649",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/26329",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/26893",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/28115",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/31492",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/38567",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/38568",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/41818",
      },
      {
         type: "WEB",
         url: "http://secunia.com/advisories/60799",
      },
      {
         type: "WEB",
         url: "http://security.freebsd.org/advisories/FreeBSD-SA-06:19.openssl.asc",
      },
      {
         type: "WEB",
         url: "http://security.gentoo.org/glsa/glsa-200609-05.xml",
      },
      {
         type: "WEB",
         url: "http://security.gentoo.org/glsa/glsa-200609-18.xml",
      },
      {
         type: "WEB",
         url: "http://securitytracker.com/id?1016791",
      },
      {
         type: "WEB",
         url: "http://securitytracker.com/id?1017522",
      },
      {
         type: "WEB",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955",
      },
      {
         type: "WEB",
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1",
      },
      {
         type: "WEB",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1",
      },
      {
         type: "WEB",
         url: "http://support.attachmate.com/techdocs/2127.html",
      },
      {
         type: "WEB",
         url: "http://support.attachmate.com/techdocs/2128.html",
      },
      {
         type: "WEB",
         url: "http://support.attachmate.com/techdocs/2137.html",
      },
      {
         type: "WEB",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2006-188.htm",
      },
      {
         type: "WEB",
         url: "http://www.arkoon.fr/upload/alertes/40AK-2006-04-FR-1.1_SSL360_OPENSSL_RSA.pdf",
      },
      {
         type: "WEB",
         url: "http://www.bluecoat.com/support/knowledge/openSSL_RSA_Signature_forgery.html",
      },
      {
         type: "WEB",
         url: "http://www.cisco.com/en/US/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html",
      },
      {
         type: "WEB",
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml",
      },
      {
         type: "WEB",
         url: "http://www.debian.org/security/2006/dsa-1174",
      },
      {
         type: "WEB",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml",
      },
      {
         type: "WEB",
         url: "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml",
      },
      {
         type: "WEB",
         url: "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html",
      },
      {
         type: "WEB",
         url: "http://www.kb.cert.org/vuls/id/845620",
      },
      {
         type: "WEB",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:161",
      },
      {
         type: "WEB",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:177",
      },
      {
         type: "WEB",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:178",
      },
      {
         type: "WEB",
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:207",
      },
      {
         type: "WEB",
         url: "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere",
      },
      {
         type: "WEB",
         url: "http://www.novell.com/linux/security/advisories/2006_26_sr.html",
      },
      {
         type: "WEB",
         url: "http://www.novell.com/linux/security/advisories/2006_55_ssl.html",
      },
      {
         type: "WEB",
         url: "http://www.novell.com/linux/security/advisories/2006_61_opera.html",
      },
      {
         type: "WEB",
         url: "http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html",
      },
      {
         type: "WEB",
         url: "http://www.openbsd.org/errata.html",
      },
      {
         type: "WEB",
         url: "http://www.openoffice.org/security/cves/CVE-2006-4339.html",
      },
      {
         type: "WEB",
         url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.018.html",
      },
      {
         type: "WEB",
         url: "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.029-bind.html",
      },
      {
         type: "WEB",
         url: "http://www.openssl.org/news/secadv_20060905.txt",
      },
      {
         type: "WEB",
         url: "http://www.opera.com/support/search/supsearch.dml?index=845",
      },
      {
         type: "WEB",
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html",
      },
      {
         type: "WEB",
         url: "http://www.osvdb.org/28549",
      },
      {
         type: "WEB",
         url: "http://www.redhat.com/support/errata/RHSA-2006-0661.html",
      },
      {
         type: "WEB",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0062.html",
      },
      {
         type: "WEB",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0072.html",
      },
      {
         type: "WEB",
         url: "http://www.redhat.com/support/errata/RHSA-2007-0073.html",
      },
      {
         type: "WEB",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0629.html",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/archive/1/445231/100/0/threaded",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/archive/1/445822/100/0/threaded",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/archive/1/450327/100/0/threaded",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/archive/1/456546/100/200/threaded",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/archive/1/489739/100/0/threaded",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/bid/19849",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/bid/22083",
      },
      {
         type: "WEB",
         url: "http://www.securityfocus.com/bid/28276",
      },
      {
         type: "WEB",
         url: "http://www.serv-u.com/releasenotes",
      },
      {
         type: "WEB",
         url: "http://www.sybase.com/detail?id=1047991",
      },
      {
         type: "WEB",
         url: "http://www.ubuntu.com/usn/usn-339-1",
      },
      {
         type: "WEB",
         url: "http://www.us-cert.gov/cas/techalerts/TA06-333A.html",
      },
      {
         type: "WEB",
         url: "http://www.us.debian.org/security/2006/dsa-1173",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/security/advisories/VMSA-2008-0005.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/player/doc/releasenotes_player.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/player2/doc/releasenotes_player2.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/server/doc/releasenotes_server.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html",
      },
      {
         type: "WEB",
         url: "http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3453",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3566",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3730",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3748",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3793",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3899",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/3936",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4205",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4206",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4207",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4216",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4327",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4329",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4366",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4417",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4586",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4744",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/4750",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2006/5146",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/0254",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/0343",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/1401",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/1815",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/1945",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/2163",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/2315",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/2783",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2007/4224",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2008/0905/references",
      },
      {
         type: "WEB",
         url: "http://www.vupen.com/english/advisories/2010/0366",
      },
      {
         type: "WEB",
         url: "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742",
      },
      {
         type: "WEB",
         url: "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117",
      },
   ],
   schema_version: "1.4.0",
   severity: [],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.