Synopsis
The remote host is missing a vendor-supplied security patch
Description
The remote host is missing the patch for the advisory SUSE-SA:2006:055 (openssl,mozilla-nss).
If an RSA key with exponent 3 is used it may be possible to forge a PKCS verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature.
This problems affects various SSL implementations. This advisory covers the following implementations:
- OpenSSL (CVE-2006-4339)
- Mozilla NSS (CVE-2006-4340 and CVE-2006-4341) for SUSE Linux 10.0, 10.1 and SUSE Linux Enterprise 10.
Implementations that are affected and still need to be updated:
- gnutls in all distributions.
- Mozilla NSS before SUSE Linux 10.0 and SUSE Linux Enterprise 10.
The official openssl advisory is here:
http://www.openssl.org/news/secadv_20060905.txt
Some details of the actual technical problem can be found here:
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Solution
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Plugin Details
File Name: suse_SA_2006_055.nasl
Agent: unix
Supported Sensors: Nessus Agent, Nessus
Vulnerability Information
Required KB Items: Host/SuSE/rpm-list