OpenSSL < 0.9.7k / 0.9.8c PKCS Padding RSA Signature Forgery Vulnerability

medium Nessus Plugin ID 17756

Synopsis

The SSL layer on the remote server does not properly verify signatures.

Description

According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.7k or 0.9.8c.

These versions do not properly verify PKCS #1 v1.5 signatures and X509 certificates when the RSA exponent is 3.

Solution

Upgrade to OpenSSL 0.9.7k / 0.9.8c or later.

See Also

https://www.openssl.org/news/secadv/20060905.txt

https://www.us-cert.gov/ncas/alerts/ta06-333a

Plugin Details

Severity: Medium

ID: 17756

File Name: openssl_0_9_7k_0_9_8c.nasl

Version: 1.14

Type: combined

Family: Web Servers

Published: 1/4/2012

Updated: 10/23/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2006-4339

CVSS v3

Risk Factor: Medium

Base Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Ease: No known exploits are available

Patch Publication Date: 9/5/2006

Vulnerability Publication Date: 9/5/2006

Reference Information

CVE: CVE-2006-4339

BID: 19849

CWE: 310

CERT: 845620