TopVuln

High-risk vulnerability digests

CVE-2006-4339

  • MEDIUM

secalert@redhat.com

Details

CVSS v2
4.3
NVD published
2006-09-05 17:04:00
Affected versions
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
Summary
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
Remediation
Not available in our cache.
Exploit info
Not available in our cache.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.