|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200609-05] OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery Vulnerability Scan
Vulnerability Scan Summary OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200609-05
(OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery)
Daniel Bleichenbacher discovered that it might be possible to forge
signatures signed by RSA keys with the exponent of 3.
Impact
Since several CAs are using an exponent of 3 it might be possible for
a possible hacker to create a key with a false CA signature.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
Solution:
All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7k"
All AMD64 x86 emulation base libraries users should upgrade to the
latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.2"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|