Lucene search

K
certCERTVU:335392
HistoryNov 08, 2006 - 12:00 a.m.

The Mozilla Network Security Services library fails to properly verify RSA signatures

2006-11-0800:00:00
www.kb.cert.org
8

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.369 Low

EPSS

Percentile

97.1%

Overview

The Mozilla Network Security Services library fails to properly verify RSA signatures. This vulnerability may allow an attacker to forge RSA signatures.

Description

RSA signatures are used to authenticate the source of a message. To prevent RSA signatures from being forged, messages are padded with data to ensure message hashes are adequately sized. The Mozilla Network Security Services (NSS) library fails to properly verify the padding in RSA signatures, ignoring data at the end of a signature. If this data is ignored and an RSA key with a public exponent of three is used, it may be possible to forge the signing key’s signature.

For more information refer to Mozilla Foundation Security Advisory 2006-66.

This vulnerability may affect any application that uses the Mozilla NSS librbary, including SSL/TLS and email certificates.


Impact

This vulnerability may allow an attacker to forge an RSA signature.


Solution

Apply an update
According to the Mozilla Foundation Security Advisory 2006-66, this vulnerability is addressed in Firefox 1.5.0.8, Thunderbird 1.5.0.8, and SeaMonkey 1.0.6.

Note that according to Mozilla:
Firefox 1.5.0.x will be maintained with security and stability updates until April 24, 2007. All users are strongly encouraged to upgrade to Firefox 2.


Vendor Information

335392

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Mozilla __ Affected

Notified: November 06, 2006 Updated: November 08, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to <http://www.mozilla.org/security/announce/2006/mfsa2006-66.html&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23335392 Feedback>).

RSA Security, Inc. __ Affected

Updated: December 18, 2006

Status

Affected

Vendor Statement

RSA BSAFE SSL-C software has been examined and confirmed to be susceptible to this vulnerability; customers should upgrade to RSA BSAFE SSL-C 2.7.1 which includes remediation for this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported in Mozilla Foundation Security Advisory 2006-66. Mozilla credits Ulrich Kuehn for providing information concerning this issue.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-5462
Severity Metric: 7.56 Date Public:

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

0.369 Low

EPSS

Percentile

97.1%