6.7 Medium
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.063 Low
EPSS
Percentile
93.6%
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html
lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html
secunia.com/advisories/21937
secunia.com/advisories/21942
secunia.com/advisories/21973
secunia.com/advisories/22049
secunia.com/advisories/22080
secunia.com/advisories/22084
secunia.com/advisories/22097
secunia.com/advisories/22226
secunia.com/advisories/22992
secunia.com/advisories/25762
security.gentoo.org/glsa/glsa-200609-15.xml
securitytracker.com/id?1016844
sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1
support.avaya.com/elmodocs2/security/ASA-2006-250.htm
www.debian.org/security/2006/dsa-1182
www.gnu.org/software/gnutls/security.html
www.mandriva.com/security/advisories?name=MDKSA-2006:166
www.novell.com/linux/security/advisories/2006_23_sr.html
www.novell.com/linux/security/advisories/2007_10_ibmjava.html
www.redhat.com/support/errata/RHSA-2006-0680.html
www.securityfocus.com/bid/20027
www.ubuntu.com/usn/usn-348-1
www.vupen.com/english/advisories/2006/3635
www.vupen.com/english/advisories/2006/3899
www.vupen.com/english/advisories/2007/2289
exchange.xforce.ibmcloud.com/vulnerabilities/28953
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9937