Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 146557

Summary: OpenSSL vulnerability up to 0.9.7j and 0.9.8b affected
Product: Gentoo Security Reporter: Bolke de Bruin <bolke>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal    
Priority: Highest    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://www.openssl.org/news/secadv_20060905.txt
Whiteboard:
Package list:
Runtime testing required: ---

Description Bolke de Bruin 2006-09-06 07:46:41 UTC
Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5
signatures. If an RSA key with exponent 3 is used it may be possible
to forge a PKCS #1 v1.5 signature signed by that key. Implementations
may incorrectly verify the certificate if they are not checking for
excess data in the RSA exponentiation result of the signature.

Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is
used in X.509 certificates, all software that uses OpenSSL to verify
X.509 certificates is potentially vulnerable, as well as any other use
of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or
TLS.

OpenSSL versions up to 0.9.7j and 0.9.8b are affected.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2006-4339 to this issue.
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-09-06 07:49:04 UTC

*** This bug has been marked as a duplicate of 146375 ***