Description
verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1182-1 | New gnutls11 packages fix RSA signature forgery cryptographic weakness |
EUVD |
EUVD-2006-4777 | verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. |
Ubuntu USN |
USN-348-1 | GnuTLS vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T19:23:41.157Z
Reserved: 2006-09-13T00:00:00.000Z
Link: CVE-2006-4790
No data.
Status : Modified
Published: 2006-09-14T19:07:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-4790
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN