Lucene search

K
mozillaMozilla FoundationMFSA2006-60
HistorySep 14, 2006 - 12:00 a.m.

RSA Signature Forgery — Mozilla

2006-09-1400:00:00
Mozilla Foundation
www.mozilla.org
14

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.264 Low

EPSS

Percentile

96.8%

Philip Mackenzie and Marius Schilder of Google informed us of Daniel Bleichenbacher’s recent presentation of a common implementation error in RSA signature verification, a failure to account for extra data in the signature. For signatures with a small exponent such as 3 it is possible for an attacker to calculate a value for this extra data to make an altered message appear to be correctly signed, allowing the signature to be forged. Mozilla’s Network Security Services (NSS) library was vulnerable to this flaw.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.7
OR
mozillanssRange<3.11.3
OR
mozillaseamonkeyRange<1.0.5
OR
mozillathunderbirdRange<1.5.0.7

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.264 Low

EPSS

Percentile

96.8%