|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200609-15] GnuTLS: RSA Signature Forgery Vulnerability Assessment Details
|
[GLSA-200609-15] GnuTLS: RSA Signature Forgery |
||
GnuTLS: RSA Signature Forgery Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200609-15 (GnuTLS: RSA Signature Forgery) verify.c fails to properly handle excess data in digestAlgorithm.parameters field while generating a hash when using an RSA key with exponent 3. RSA keys that use exponent 3 are commonplace. Impact Remote attackers could forge PKCS #1 v1.5 signatures that are signed with an RSA key, preventing GnuTLS from correctly verifying X.509 and other certificates that use PKCS. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790 Solution: All GnuTLS users should update both packages: # emerge --sync # emerge --update --ask --verbose ">=net-libs/gnutls-1.4.4" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2006 Michel Arboi |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |