Lucene search

K
ubuntuUbuntuUSN-339-1
HistorySep 05, 2006 - 12:00 a.m.

OpenSSL vulnerability

2006-09-0500:00:00
ubuntu.com
38

9.7 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.093 Low

EPSS

Percentile

94.6%

Releases

  • Ubuntu 6.06
  • Ubuntu 5.10
  • Ubuntu 5.04

Details

Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie of
Google Security discovered that the OpenSSL library did not
sufficiently check the padding of PKCS #1 v1.5 signatures if the
exponent of the public key is 3 (which is widely used for CAs). This
could be exploited to forge signatures without the need of the secret
key.

OSVersionArchitecturePackageVersionFilename
Ubuntu6.06noarchlibssl0.9.8< 0.9.8a-7ubuntu0.1UNKNOWN
Ubuntu5.10noarchlibssl0.9.7< 0.9.7g-1ubuntu1.2UNKNOWN
Ubuntu5.04noarchlibssl0.9.7< 0.9.7e-3ubuntu0.3UNKNOWN

9.7 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.093 Low

EPSS

Percentile

94.6%