Page 9 of 41 results (0.014 seconds)

CVSS: 5.0EPSS: 4%CPEs: 40EXPL: 0

verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339. verify.c en GnuTLS anterior a 1.4.4, cuando usamos una llave RSA con exponente 3, no maneja correctamente el exceso de datos en el campo digestAlgorithm.parameters al generar un hash, el cual permite a un atacante remoto falsificar una firma PKCS #1 v1.5 que es firmada por esa llave RSA y evita que GnuTLS verifique correctamente X.509 y otros certificados que utilicen PKCS, es una variante de CVE-2006-4339. • http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001205.html http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001212.html http://secunia.com/advisories/21937 http://secunia.com/advisories/21942 http://secunia.com/advisories/21973 http://secunia.com/advisories/22049 http://secunia.com/advisories/22080 http://secunia.com/advisories/22084 http://secunia.com/advisories/22097 http://secunia.com/advisories/22226 http://secunia.com/advisories/22992 http://secunia&# •