|
Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2006:055: openssl,mozilla-nss Vulnerability Scan
Vulnerability Scan Summary Check for the version of the openssl,mozilla-nss package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2006:055 (openssl,mozilla-nss).
If an RSA key with exponent 3 is used it may be possible to forge a
PKCS verify the certificate if they are not checking for excess data
in the RSA exponentiation result of the signature.
This problems affects various SSL implementations. This advisory
covers the following implementations:
- OpenSSL (CVE-2006-4339)
- Mozilla NSS (CVE-2006-4340 and CVE-2006-4341)
for SUSE Linux 10.0, 10.1 and SUSE Linux Enterprise 10.
Implementations that are affected and still need to be updated:
- gnutls in all distributions.
- Mozilla NSS before SUSE Linux 10.0 and SUSE Linux Enterprise 10.
The official openssl advisory is here:
http://www.openssl.org/news/secadv_20060905.txt
Some details of the actual technical problem can be found here:
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|