ID USN-348-1 Type ubuntu Reporter Ubuntu Modified 2006-09-19T00:00:00
Description
The GnuTLS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.
{"id": "USN-348-1", "bulletinFamily": "unix", "title": "GnuTLS vulnerability", "description": "The GnuTLS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.", "published": "2006-09-19T00:00:00", "modified": "2006-09-19T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://usn.ubuntu.com/348-1/", "reporter": "Ubuntu", "references": ["https://people.canonical.com/~ubuntu-security/cve/CVE-2006-4790"], "cvelist": ["CVE-2006-4790"], "type": "ubuntu", "lastseen": "2018-03-29T18:20:08", "history": [], "edition": 1, "hashmap": [{"key": "affectedPackage", "hash": "1b5ae840fb6926a3df196317a214ec1a"}, {"key": "bulletinFamily", "hash": "4913a9178621eadcdf191db17915fbcb"}, {"key": "cvelist", "hash": "b451bf8cbf445700420a367c1cc92ef6"}, {"key": "cvss", "hash": "26769fd423968d45be7383413e2552f1"}, {"key": "description", "hash": "00e6ac05b51c6ae9e0e9d8492ba3d437"}, {"key": "href", "hash": "086ed6117fcf7ec7513b1fd2c1ea5a35"}, {"key": "modified", "hash": "0ef402baca9df3aceb5c351585aaa46e"}, {"key": "published", "hash": "0ef402baca9df3aceb5c351585aaa46e"}, {"key": "references", "hash": "0dee911d43a028e6a1611946986017d8"}, {"key": "reporter", "hash": "3d945423f8e9496c429a5d8c65b4604f"}, {"key": "title", "hash": "39689a7011581f652e9357c2510b32f7"}, {"key": "type", "hash": "1d41c853af58d3a7ae54990ce29417d8"}], "hash": "3567e94af6404b10c24740791e034a1a17635d950c315e15dc009e45c59e60ac", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "affectedPackage": [{"OS": "Ubuntu", "OSVersion": "5.10", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "libgnutls11 - 1.0.16-13.1ubuntu1.2", "packageVersion": "any"}, {"OS": "Ubuntu", "OSVersion": "5.04", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "libgnutls11 - 1.0.16-13ubuntu0.3", "packageVersion": "any"}, {"OS": "Ubuntu", "OSVersion": "6.06", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "libgnutls12 - 1.2.9-2ubuntu1.1", "packageVersion": "any"}, {"OS": "Ubuntu", "OSVersion": "6.06", "arch": "noarch", "operator": "lt", "packageFilename": "UNKNOWN", "packageName": "libgnutls11 - 1.0.16-14ubuntu1.1", "packageVersion": "any"}]}
{"result": {"cve": [{"id": "CVE-2006-4790", "type": "cve", "title": "CVE-2006-4790", "description": "verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.", "published": "2006-09-14T15:07:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-4790", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-11T11:06:47"}], "nessus": [{"id": "REDHAT-RHSA-2006-0680.NASL", "type": "nessus", "title": "RHEL 4 : gnutls (RHSA-2006:0680)", "description": "Updated gnutls packages that fix a security issue are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nThe GnuTLS Library provides support for cryptographic algorithms and protocols such as TLS. GnuTLS includes libtasn1, a library developed for ASN.1 structures management that includes DER encoding and decoding.\n\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Where an RSA key with exponent 3 is used it may be possible for an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly verified by implementations that do not check for excess data in the RSA exponentiation result of the signature.\n\nThe core GnuTLS team discovered that GnuTLS is vulnerable to a variant of the Bleichenbacker attack. This issue affects applications that use GnuTLS to verify X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4790)\n\nIn Red Hat Enterprise Linux 4, the GnuTLS library is only used by the Evolution client when connecting to an Exchange server or when publishing calendar information to a WebDAV server.\n\nUsers are advised to upgrade to these updated packages, which contain a backported patch from the GnuTLS maintainers to correct this issue.", "published": "2006-09-15T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22360", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:43:36"}, {"id": "MANDRAKE_MDKSA-2006-166.NASL", "type": "nessus", "title": "Mandrake Linux Security Advisory : gnutls (MDKSA-2006:166)", "description": "verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.\n\nThe provided packages have been patched to correct this issues.", "published": "2007-02-18T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=24552", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:37:27"}, {"id": "SUSE9_11228.NASL", "type": "nessus", "title": "SuSE9 Security Update : gnutls (YOU Patch Number 11228)", "description": "A security problem in the GNU TLS library has been found :\n\nIf an RSA key with exponent 3 is used, the PKCS padding gets removed before generating a hash, which allows remote attackers to forge a PKCS signature that apapears to be signed by that RSA key and prevents gnutls from correctly verifying the certificate.\n\nThis bug has been tracked by the Mitre CVE ID CVE-2006-4790.", "published": "2009-09-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=41101", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:38:09"}, {"id": "SUSE_GNUTLS-2117.NASL", "type": "nessus", "title": "SuSE 10 Security Update : gnutls (ZYPP Patch Number 2117)", "description": "A security problem was fixed in the GNU TLS library, where excess data was not checked during signature checking with RSA keys with exponent 3.\n\nThis problem could be used to fake those RSA signatures.\n(CVE-2006-4790)", "published": "2007-12-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=29447", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:40:02"}, {"id": "GENTOO_GLSA-200609-15.NASL", "type": "nessus", "title": "GLSA-200609-15 : GnuTLS: RSA Signature Forgery", "description": "The remote host is affected by the vulnerability described in GLSA-200609-15 (GnuTLS: RSA Signature Forgery)\n\n verify.c fails to properly handle excess data in digestAlgorithm.parameters field while generating a hash when using an RSA key with exponent 3. RSA keys that use exponent 3 are commonplace.\n Impact :\n\n Remote attackers could forge PKCS #1 v1.5 signatures that are signed with an RSA key, preventing GnuTLS from correctly verifying X.509 and other certificates that use PKCS.\n Workaround :\n\n There is no known workaround at this time.", "published": "2006-09-27T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22459", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:43:41"}, {"id": "SUSE_JAVA-1_4_2-IBM-2461.NASL", "type": "nessus", "title": "SuSE 10 Security Update : IBM Java (ZYPP Patch Number 2461)", "description": "This update brings IBM Java 1.4.2 to Service Release 7.\n\nIt contains several undisclosed security fixes, including the fix for the RSA attack similar to Mitre CVE ID CVE-2006-4790.\n\nIt also contains timezone updates :\n\n - US daylightsaving time update starting 2007.\n\n - Western Australia daylight savings time introduction in December 2006.\n\n - Update to current timezone dataset.", "published": "2007-12-13T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=29468", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:39:00"}, {"id": "CENTOS_RHSA-2006-0680.NASL", "type": "nessus", "title": "CentOS 4 : gnutls (CESA-2006:0680)", "description": "Updated gnutls packages that fix a security issue are now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nThe GnuTLS Library provides support for cryptographic algorithms and protocols such as TLS. GnuTLS includes libtasn1, a library developed for ASN.1 structures management that includes DER encoding and decoding.\n\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Where an RSA key with exponent 3 is used it may be possible for an attacker to forge a PKCS #1 v1.5 signature that would be incorrectly verified by implementations that do not check for excess data in the RSA exponentiation result of the signature.\n\nThe core GnuTLS team discovered that GnuTLS is vulnerable to a variant of the Bleichenbacker attack. This issue affects applications that use GnuTLS to verify X.509 certificates as well as other uses of PKCS #1 v1.5. (CVE-2006-4790)\n\nIn Red Hat Enterprise Linux 4, the GnuTLS library is only used by the Evolution client when connecting to an Exchange server or when publishing calendar information to a WebDAV server.\n\nUsers are advised to upgrade to these updated packages, which contain a backported patch from the GnuTLS maintainers to correct this issue.", "published": "2006-09-22T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22427", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:42:45"}, {"id": "FREEBSD_PKG_64BF6234520D11DB8F1A000A48049292.NASL", "type": "nessus", "title": "FreeBSD : gnutls -- RSA Signature Forgery Vulnerability (64bf6234-520d-11db-8f1a-000a48049292)", "description": "Secunia reports :\n\nA vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions.\n\nThe vulnerability is caused due to an error in the verification of certain signatures. If a RSA key with exponent 3 is used, it may be possible to forge PKCS #1 v1.5 signatures signed with that key.", "published": "2006-10-05T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22501", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:37:31"}, {"id": "DEBIAN_DSA-1182.NASL", "type": "nessus", "title": "Debian DSA-1182-1 : gnutls11 - cryptographic weakness", "description": "Daniel Bleichenbacher discovered a flaw in GNU TLS cryptographic package that could allow an attacker to generate a forged signature that GNU TLS will accept as valid.", "published": "2006-10-14T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=22724", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:37:15"}, {"id": "UBUNTU_USN-348-1.NASL", "type": "nessus", "title": "Ubuntu 5.04 / 5.10 / 6.06 LTS : gnutls11, gnutls12 vulnerability (USN-348-1)", "description": "The GnuTLS library did not sufficiently check the padding of PKCS #1 v1.5 signatures if the exponent of the public key is 3 (which is widely used for CAs). This could be exploited to forge signatures without the need of the secret key.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2007-11-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=27928", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-29T13:43:38"}], "openvas": [{"id": "OPENVAS:57893", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200609-15 (gnutls)", "description": "The remote host is missing updates announced in\nadvisory GLSA 200609-15.", "published": "2008-09-24T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=57893", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-07-24T12:50:03"}, {"id": "OPENVAS:57467", "type": "openvas", "title": "FreeBSD Ports: gnutls, gnutls-devel", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "published": "2008-09-04T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=57467", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-07-02T21:10:26"}, {"id": "OPENVAS:65366", "type": "openvas", "title": "SLES9: Security update for IBM Java2 JRE and SDK", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n IBMJava2-SDK\n IBMJava2-JRE\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015753 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=65366", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-07-26T08:55:18"}, {"id": "OPENVAS:136141256231065366", "type": "openvas", "title": "SLES9: Security update for IBM Java2 JRE and SDK", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n IBMJava2-SDK\n IBMJava2-JRE\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5015753 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "published": "2009-10-10T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065366", "cvelist": ["CVE-2006-4790"], "lastseen": "2018-04-06T11:37:35"}, {"id": "OPENVAS:57406", "type": "openvas", "title": "Debian Security Advisory DSA 1182-1 (gnutls11)", "description": "The remote host is missing an update to gnutls11\nannounced via advisory DSA 1182-1.\n\nDaniel Bleichenbacher discovered a flaw in GNU TLS cryptographic package\nthat could allow an attacker to generate a forged signature that GNU TLS\nwill accept as valid.", "published": "2008-01-17T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=57406", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-07-24T12:50:02"}, {"id": "OPENVAS:850066", "type": "openvas", "title": "SuSE Update for IBMJava2 SUSE-SA:2007:010", "description": "Check for the Version of IBMJava2", "published": "2009-01-28T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=850066", "cvelist": ["CVE-2006-4790", "CVE-2006-6731", "CVE-2006-4339", "CVE-2006-6736", "CVE-2006-6737", "CVE-2006-6745"], "lastseen": "2017-12-12T11:21:05"}], "gentoo": [{"id": "GLSA-200609-15", "type": "gentoo", "title": "GnuTLS: RSA Signature Forgery", "description": "### Background\n\nGnuTLS is an implementation of SSL 3.0 and TLS 1.0. \n\n### Description\n\nverify.c fails to properly handle excess data in digestAlgorithm.parameters field while generating a hash when using an RSA key with exponent 3. RSA keys that use exponent 3 are commonplace. \n\n### Impact\n\nRemote attackers could forge PKCS #1 v1.5 signatures that are signed with an RSA key, preventing GnuTLS from correctly verifying X.509 and other certificates that use PKCS. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll GnuTLS users should update both packages: \n \n \n # emerge --sync\n # emerge --update --ask --verbose \">=net-libs/gnutls-1.4.4\"", "published": "2006-09-26T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://security.gentoo.org/glsa/200609-15", "cvelist": ["CVE-2006-4790"], "lastseen": "2016-09-06T19:47:00"}], "oraclelinux": [{"id": "ELSA-2006-0680", "type": "oraclelinux", "title": "Important gnutls security update ", "description": " [1.0.20-3.2.3]\n - detect forged signatures - CVE-2006-4790 (#206411), patch\n backported from upstream ", "published": "2006-11-30T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://linux.oracle.com/errata/ELSA-2006-0680.html", "cvelist": ["CVE-2006-4790"], "lastseen": "2016-09-04T11:16:13"}], "debian": [{"id": "DSA-1182", "type": "debian", "title": "gnutls11 -- cryptographic weakness", "description": "Daniel Bleichenbacher discovered a flaw in GNU TLS cryptographic package that could allow an attacker to generate a forged signature that GNU TLS will accept as valid.\n\nFor the stable distribution (sarge) this problem has been fixed in version 1.0.16-13.2sarge2.\n\nThe unstable distribution (sid) does no longer contain gnutls11, for gnutls13 this problem has been fixed in version 1.4.4-1.\n\nWe recommend that you upgrade your GNU TLS package.", "published": "2006-09-22T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://www.debian.org/security/dsa-1182", "cvelist": ["CVE-2006-4790"], "lastseen": "2016-09-02T18:24:22"}], "redhat": [{"id": "RHSA-2006:0680", "type": "redhat", "title": "(RHSA-2006:0680) gnutls security update", "description": "The GnuTLS Library provides support for cryptographic algorithms and\r\nprotocols such as TLS. GnuTLS includes libtasn1, a library developed for\r\nASN.1 structures management that includes DER encoding and decoding.\r\n\r\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5\r\nsignatures. Where an RSA key with exponent 3 is used it may be possible for\r\nan attacker to forge a PKCS #1 v1.5 signature that would be incorrectly\r\nverified by implementations that do not check for excess data in the RSA\r\nexponentiation result of the signature.\r\n\r\nThe core GnuTLS team discovered that GnuTLS is vulnerable to a variant of\r\nthe Bleichenbacker attack. This issue affects applications that use GnuTLS\r\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\r\n(CVE-2006-4790)\r\n\r\nIn Red Hat Enterprise Linux 4, the GnuTLS library is only used by the\r\nEvolution client when connecting to an Exchange server or when publishing\r\ncalendar information to a WebDAV server.\r\n\r\nUsers are advised to upgrade to these updated packages, which contain a\r\nbackported patch from the GnuTLS maintainers to correct this issue.", "published": "2006-09-14T04:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://access.redhat.com/errata/RHSA-2006:0680", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-09-08T13:20:24"}], "freebsd": [{"id": "64BF6234-520D-11DB-8F1A-000A48049292", "type": "freebsd", "title": "gnutls -- RSA Signature Forgery Vulnerability", "description": "\nSecunia reports:\n\nA vulnerability has been reported in GnuTLS, which can be\n\t exploited by malicious people to bypass certain security\n\t restrictions.\nThe vulnerability is caused due to an error in the\n\t verification of certain signatures. If a RSA key with\n\t exponent 3 is used, it may be possible to forge PKCS #1\n\t v1.5 signatures signed with that key.\n\n", "published": "2006-09-08T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://vuxml.freebsd.org/freebsd/64bf6234-520d-11db-8f1a-000a48049292.html", "cvelist": ["CVE-2006-4790"], "lastseen": "2016-09-26T17:25:05"}], "osvdb": [{"id": "OSVDB:28778", "type": "osvdb", "title": "GnuTLS RSA Key PKCS #1 v1.5 Signature Forgery", "description": "# No description provided by the source\n\n## References:\nVendor Specific News/Changelog Entry: http://www.gnu.org/software/gnutls/security.html\n[Vendor Specific Advisory URL](http://www.us.debian.org/security/2006/dsa-1182)\n[Vendor Specific Advisory URL](http://lists.suse.com/archive/suse-security-announce/2006-Sep/0011.html)\n[Vendor Specific Advisory URL](http://www.mandriva.com/security/advisories?name=MDKSA-2006:166)\n[Vendor Specific Advisory URL](http://www.gentoo.org/security/en/glsa/glsa-200609-15.xml)\n[Secunia Advisory ID:21942](https://secuniaresearch.flexerasoftware.com/advisories/21942/)\n[Secunia Advisory ID:22097](https://secuniaresearch.flexerasoftware.com/advisories/22097/)\n[Secunia Advisory ID:21973](https://secuniaresearch.flexerasoftware.com/advisories/21973/)\n[Secunia Advisory ID:23803](https://secuniaresearch.flexerasoftware.com/advisories/23803/)\n[Secunia Advisory ID:21937](https://secuniaresearch.flexerasoftware.com/advisories/21937/)\n[Secunia Advisory ID:22049](https://secuniaresearch.flexerasoftware.com/advisories/22049/)\n[Secunia Advisory ID:22084](https://secuniaresearch.flexerasoftware.com/advisories/22084/)\n[Secunia Advisory ID:22080](https://secuniaresearch.flexerasoftware.com/advisories/22080/)\n[Secunia Advisory ID:25762](https://secuniaresearch.flexerasoftware.com/advisories/25762/)\nRedHat RHSA: RHSA-2006:0680\nOther Advisory URL: http://sunsolve.sun.com/search/document.do?assetkey=1-26-102970-1\nOther Advisory URL: http://www.ubuntu.com/usn/usn-348-1\nOther Advisory URL: http://lists.suse.com/archive/suse-security-announce/2007-Jan/0010.html\nMail List Post: http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html\nMail List Post: http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html\n[CVE-2006-4790](https://vulners.com/cve/CVE-2006-4790)\n", "published": "2006-09-08T06:49:08", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://vulners.com/osvdb/OSVDB:28778", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-04-28T13:20:25"}], "centos": [{"id": "CESA-2006:0680", "type": "centos", "title": "gnutls security update", "description": "**CentOS Errata and Security Advisory** CESA-2006:0680\n\n\nThe GnuTLS Library provides support for cryptographic algorithms and\r\nprotocols such as TLS. GnuTLS includes libtasn1, a library developed for\r\nASN.1 structures management that includes DER encoding and decoding.\r\n\r\nDaniel Bleichenbacher recently described an attack on PKCS #1 v1.5\r\nsignatures. Where an RSA key with exponent 3 is used it may be possible for\r\nan attacker to forge a PKCS #1 v1.5 signature that would be incorrectly\r\nverified by implementations that do not check for excess data in the RSA\r\nexponentiation result of the signature.\r\n\r\nThe core GnuTLS team discovered that GnuTLS is vulnerable to a variant of\r\nthe Bleichenbacker attack. This issue affects applications that use GnuTLS\r\nto verify X.509 certificates as well as other uses of PKCS #1 v1.5.\r\n(CVE-2006-4790)\r\n\r\nIn Red Hat Enterprise Linux 4, the GnuTLS library is only used by the\r\nEvolution client when connecting to an Exchange server or when publishing\r\ncalendar information to a WebDAV server.\r\n\r\nUsers are advised to upgrade to these updated packages, which contain a\r\nbackported patch from the GnuTLS maintainers to correct this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2006-September/013239.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-September/013240.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-September/013275.html\nhttp://lists.centos.org/pipermail/centos-announce/2006-September/013276.html\n\n**Affected packages:**\ngnutls\ngnutls-devel\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2006-0680.html", "published": "2006-09-14T14:44:53", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "http://lists.centos.org/pipermail/centos-announce/2006-September/013239.html", "cvelist": ["CVE-2006-4790"], "lastseen": "2017-10-12T14:45:00"}], "suse": [{"id": "SUSE-SA:2007:010", "type": "suse", "title": "remote code execution in IBMJava2", "description": "Various security problems and bugs have been fixed in the IBMJava JRE and SDK.\n#### Solution\nThere is no known workaround, please install the update packages.", "published": "2007-01-18T16:13:31", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2007-01/msg00025.html", "cvelist": ["CVE-2006-4790", "CVE-2006-6731", "CVE-2006-4339", "CVE-2006-6736", "CVE-2006-6737", "CVE-2006-6745"], "lastseen": "2016-09-04T11:46:49"}]}}