CVE-2006-4339
Public on
Last Modified:
Description
A flaw was found in OpenSSL. When configured to use an RSA key with exponent 3, OpenSSL improperly removes PKCS-1 padding before generating a hash. This allows remote attackers to forge PKCS #1 v1.5 signatures. Consequently, OpenSSL may incorrectly verify X.509 and other certificates, leading to a bypass of trust and authentication mechanisms.
Mitigation
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Additional Information
- Content from cwe.mitre.org is not included.CWE-347: Improper Verification of Cryptographic Signature
- FAQ: Frequently asked questions about CVE-2006-4339
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.
External References
Content from www.cve.org is not included.https://www.cve.org/CVERecord?id=CVE-2006-4339
Content from nvd.nist.gov is not included.https://nvd.nist.gov/vuln/detail/CVE-2006-4339
Content from dev2dev.bea.com is not included.http://dev2dev.bea.com/pub/advisory/238
Content from jvn.jp is not included.http://jvn.jp/en/jp/JVN51615542/index.html
Content from marc.info is not included.http://marc.info/?l=bind-announce&m=116253119512445&w=2
Content from marc.info is not included.http://marc.info/?l=bugtraq&m=130497311408250&w=2
Content from openvpn.net is not included.http://openvpn.net/changelog.html
Content from secunia.com is not included.http://secunia.com/advisories/21709
Content from secunia.com is not included.http://secunia.com/advisories/21767
Content from secunia.com is not included.http://secunia.com/advisories/21776
Content from secunia.com is not included.http://secunia.com/advisories/21778
Content from secunia.com is not included.http://secunia.com/advisories/21785
Content from secunia.com is not included.http://secunia.com/advisories/21791
Content from secunia.com is not included.http://secunia.com/advisories/21812
Content from secunia.com is not included.http://secunia.com/advisories/21823
Content from secunia.com is not included.http://secunia.com/advisories/21846
Content from secunia.com is not included.http://secunia.com/advisories/21852
Content from secunia.com is not included.http://secunia.com/advisories/21870
Content from secunia.com is not included.http://secunia.com/advisories/21873
Content from secunia.com is not included.http://secunia.com/advisories/21906
Content from secunia.com is not included.http://secunia.com/advisories/21927
Content from secunia.com is not included.http://secunia.com/advisories/21930
Content from secunia.com is not included.http://secunia.com/advisories/21982
Content from secunia.com is not included.http://secunia.com/advisories/22036
Content from secunia.com is not included.http://secunia.com/advisories/22044
Content from secunia.com is not included.http://secunia.com/advisories/22066
Content from secunia.com is not included.http://secunia.com/advisories/22161
Content from secunia.com is not included.http://secunia.com/advisories/22226
Content from secunia.com is not included.http://secunia.com/advisories/22232
Content from secunia.com is not included.http://secunia.com/advisories/22259
Content from secunia.com is not included.http://secunia.com/advisories/22260
Content from secunia.com is not included.http://secunia.com/advisories/22284
Content from secunia.com is not included.http://secunia.com/advisories/22325
Content from secunia.com is not included.http://secunia.com/advisories/22446
Content from secunia.com is not included.http://secunia.com/advisories/22509
Content from secunia.com is not included.http://secunia.com/advisories/22513
Content from secunia.com is not included.http://secunia.com/advisories/22523
Content from secunia.com is not included.http://secunia.com/advisories/22545
Content from secunia.com is not included.http://secunia.com/advisories/22585
Content from secunia.com is not included.http://secunia.com/advisories/22671
Content from secunia.com is not included.http://secunia.com/advisories/22689
Content from secunia.com is not included.http://secunia.com/advisories/22711
Content from secunia.com is not included.http://secunia.com/advisories/22733
Content from secunia.com is not included.http://secunia.com/advisories/22758
Content from secunia.com is not included.http://secunia.com/advisories/22799
Content from secunia.com is not included.http://secunia.com/advisories/22932
Content from secunia.com is not included.http://secunia.com/advisories/22934
Content from secunia.com is not included.http://secunia.com/advisories/22936
Content from secunia.com is not included.http://secunia.com/advisories/22937
Content from secunia.com is not included.http://secunia.com/advisories/22938
Content from secunia.com is not included.http://secunia.com/advisories/22939
Content from secunia.com is not included.http://secunia.com/advisories/22940
Content from secunia.com is not included.http://secunia.com/advisories/22948
Content from secunia.com is not included.http://secunia.com/advisories/22949
Content from secunia.com is not included.http://secunia.com/advisories/23155
Content from secunia.com is not included.http://secunia.com/advisories/23455
Content from secunia.com is not included.http://secunia.com/advisories/23680
Content from secunia.com is not included.http://secunia.com/advisories/23794
Content from secunia.com is not included.http://secunia.com/advisories/23841
Content from secunia.com is not included.http://secunia.com/advisories/23915
Content from secunia.com is not included.http://secunia.com/advisories/24099
Content from secunia.com is not included.http://secunia.com/advisories/24930
Content from secunia.com is not included.http://secunia.com/advisories/24950
Content from secunia.com is not included.http://secunia.com/advisories/25284
Content from secunia.com is not included.http://secunia.com/advisories/25399
Content from secunia.com is not included.http://secunia.com/advisories/25649
Content from secunia.com is not included.http://secunia.com/advisories/26329
Content from secunia.com is not included.http://secunia.com/advisories/26893
Content from secunia.com is not included.http://secunia.com/advisories/28115
Content from secunia.com is not included.http://secunia.com/advisories/31492
Content from secunia.com is not included.http://secunia.com/advisories/38567
Content from secunia.com is not included.http://secunia.com/advisories/38568
Content from secunia.com is not included.http://secunia.com/advisories/41818
Content from secunia.com is not included.http://secunia.com/advisories/60799
Content from security.gentoo.org is not included.http://security.gentoo.org/glsa/glsa-200609-05.xml
Content from security.gentoo.org is not included.http://security.gentoo.org/glsa/glsa-200609-18.xml
Content from securitytracker.com is not included.http://securitytracker.com/id?1016791
Content from securitytracker.com is not included.http://securitytracker.com/id?1017522
Content from support.attachmate.com is not included.http://support.attachmate.com/techdocs/2127.html
Content from support.attachmate.com is not included.http://support.attachmate.com/techdocs/2128.html
Content from support.attachmate.com is not included.http://support.attachmate.com/techdocs/2137.html
Content from www.debian.org is not included.http://www.debian.org/security/2006/dsa-1174
Content from www.imc.org is not included.http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Content from www.kb.cert.org is not included.http://www.kb.cert.org/vuls/id/845620
Content from www.openbsd.org is not included.http://www.openbsd.org/errata.html
This content is not included.http://www.openoffice.org/security/cves/CVE-2006-4339.html
Content from www.openssl.org is not included.http://www.openssl.org/news/secadv_20060905.txt
Content from www.osvdb.org is not included.http://www.osvdb.org/28549
This content is not included.http://www.redhat.com/support/errata/RHSA-2006-0661.html
This content is not included.http://www.redhat.com/support/errata/RHSA-2007-0062.html
This content is not included.http://www.redhat.com/support/errata/RHSA-2007-0072.html
This content is not included.http://www.redhat.com/support/errata/RHSA-2007-0073.html
This content is not included.http://www.redhat.com/support/errata/RHSA-2008-0629.html
Content from www.securityfocus.com is not included.http://www.securityfocus.com/bid/19849
Content from www.securityfocus.com is not included.http://www.securityfocus.com/bid/22083
Content from www.securityfocus.com is not included.http://www.securityfocus.com/bid/28276
Content from www.serv-u.com is not included.http://www.serv-u.com/releasenotes/
Content from www.sybase.com is not included.http://www.sybase.com/detail?id=1047991
Content from www.ubuntu.com is not included.http://www.ubuntu.com/usn/usn-339-1
Content from www.us-cert.gov is not included.http://www.us-cert.gov/cas/techalerts/TA06-333A.html
Content from www.us.debian.org is not included.http://www.us.debian.org/security/2006/dsa-1173
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3453
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3566
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3730
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3748
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3793
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3899
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/3936
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4205
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4206
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4207
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4216
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4327
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4329
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4366
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4417
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4586
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4744
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/4750
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2006/5146
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/0254
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/0343
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/1401
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/1815
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/1945
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/2163
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/2315
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/2783
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2007/4224
Content from www.vupen.com is not included.http://www.vupen.com/english/advisories/2010/0366
Content from issues.rpath.com is not included.https://issues.rpath.com/browse/RPL-1633
Content from issues.rpath.com is not included.https://issues.rpath.com/browse/RPL-616
Affected Packages and Issued Red Hat Security Errata
| Products / Services | Components | State | Errata |
|---|---|---|---|
| Red Hat Enterprise Linux 10 | edk2 | Not affected | |
| Red Hat Enterprise Linux 10 | openssl | Not affected | |
| Red Hat Enterprise Linux 10 | shim | Not affected | |
| Red Hat Enterprise Linux 10 | shim-unsigned-aarch64 | Not affected | |
| Red Hat Enterprise Linux 10 | shim-unsigned-x64 | Not affected | |
| Red Hat Enterprise Linux 6 | openssl | Not affected | |
| Red Hat Enterprise Linux 7 | openssl | Not affected | |
| Red Hat Enterprise Linux 7 | ovmf | Not affected | |
| Red Hat Enterprise Linux 8 | compat-openssl10 | Not affected | |
| Red Hat Enterprise Linux 8 | edk2 | Not affected | |
| Red Hat Enterprise Linux 8 | mingw-openssl | Not affected | |
| Red Hat Enterprise Linux 8 | openssl | Not affected | |
| Red Hat Enterprise Linux 8 | shim | Not affected | |
| Red Hat Enterprise Linux 8 | shim-unsigned-x64 | Not affected | |
| Red Hat Enterprise Linux 9 | compat-openssl11 | Not affected | |
| Red Hat Enterprise Linux 9 | edk2 | Not affected | |
| Red Hat Enterprise Linux 9 | openssl | Not affected | |
| Red Hat Enterprise Linux 9 | shim | Not affected | |
| Red Hat Enterprise Linux 9 | shim-unsigned-aarch64 | Not affected | |
| Red Hat Enterprise Linux 9 | shim-unsigned-x64 | Not affected | |
| Red Hat JBoss Core Services | openssl | Not affected | |
| Red Hat OpenShift Container Platform 4 | rhcos | Not affected |
Common Vulnerability Scoring System (CVSS) Score Details
Important note
CVSS scores for open source components depend on vendor-specific factors (e.g. version or build chain). Therefore, Red Hat's score and impact rating can be different from NVD and other vendors. Red Hat remains the authoritative CVE Naming Authorities (CNA) source for its products and services (see Red Hat classifications ).
The following CVSS metrics and score provided are preliminary and subject to review.
| CVSS v3 Score Breakdown | Red Hat | NVD |
|---|---|---|
| CVSS v3 Base Score | 9.1 | |
| Attack Vector | Network | |
| Attack Complexity | Low | |
| Privileges Required | None | |
| User Interaction | None | |
| Scope | Unchanged | |
| Confidentiality Impact | High | |
| Integrity Impact | High | |
| Availability Impact | None |
CVSS v3 Vector
Red Hat CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Frequently Asked Questions
Why is Red Hat's CVSS v3 score or Impact different from other vendors?
For more information, see https://access.redhat.com/solutions/762393.
My product is listed as "Under investigation" or "Affected", when will Red Hat release a fix for this vulnerability?
- "Under investigation" doesn't necessarily mean that the product is affected by this vulnerability. It only means that our Analysis Team is still working on determining whether the product is affected and how it is affected.
- "Affected" means that our Analysis Team has determined that this product is affected by this vulnerability and might release a fix to address this in the near future.
What can I do if my product is listed as "Will not fix"?
Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options:
- Upgrade to a supported product version that includes a fix for this vulnerability (recommended).
- Apply a mitigation (if one exists).
- Open a This content is not included.support case to request a prioritization of releasing a fix for this vulnerability.
What can I do if my product is listed as "Fix deferred"?
Available options depend mostly on the Impact of the vulnerability and the current Life Cycle phase of your product. Overall, you have the following options:
- Apply a mitigation (if one exists).
- Open a This content is not included.support case to request a prioritization of releasing a fix for this vulnerability.
- Red Hat Engineering focuses on addressing high-priority issues based on their complexity or limited lifecycle support. Therefore, lower-priority issues will not receive immediate fixes.
What is a mitigation?
I have a Red Hat product but it is not in the above list, is it affected?
Why is my security scanner reporting my product as vulnerable to this vulnerability even though my product version is fixed or not affected?
Not sure what something means? Check out our Security Glossary.