Lucene search

K
gentooGentoo FoundationGLSA-200609-15
HistorySep 26, 2006 - 12:00 a.m.

GnuTLS: RSA Signature Forgery

2006-09-2600:00:00
Gentoo Foundation
security.gentoo.org
10

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.063 Low

EPSS

Percentile

93.6%

Background

GnuTLS is an implementation of SSL 3.0 and TLS 1.0.

Description

verify.c fails to properly handle excess data in digestAlgorithm.parameters field while generating a hash when using an RSA key with exponent 3. RSA keys that use exponent 3 are commonplace.

Impact

Remote attackers could forge PKCS #1 v1.5 signatures that are signed with an RSA key, preventing GnuTLS from correctly verifying X.509 and other certificates that use PKCS.

Workaround

There is no known workaround at this time.

Resolution

All GnuTLS users should update both packages:

 # emerge --sync
 # emerge --update --ask --verbose ">=net-libs/gnutls-1.4.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-libs/gnutls< 1.4.4UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.063 Low

EPSS

Percentile

93.6%