Lucene search

K
freebsdFreeBSD1FE734BF-4A06-11DB-B48D-00508D6A62DF
HistorySep 18, 2006 - 12:00 a.m.

opera -- RSA Signature Forgery

2006-09-1800:00:00
vuxml.freebsd.org
26

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.093 Low

EPSS

Percentile

94.7%

Opera reports:

A specially crafted digital certificate can bypass Opera’s
certificate signature verification. Forged certificates can
contain any false information the forger chooses, and Opera
will still present it as valid. Opera will not present any
warning dialogs in this case, and the security status will
be the highest possible (3). This defeats the protection
against “man in the middle”, the attacks that SSL was
designed to prevent.
There is a flaw in OpenSSL’s RSA signature verification
that affects digital certificates using 3 as the public
exponent. Some of the certificate issuers that are on
Opera’s list of trusted signers have root certificates with
3 as the public exponent. The forged certificate can appear
to be signed by one of these.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchopera< 9.02UNKNOWN
FreeBSDanynoarchopera-devel< 9.02UNKNOWN
FreeBSDanynoarchlinux-opera< 9.02UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.093 Low

EPSS

Percentile

94.7%