blob: 3616bb7ba58e152cd9e22f6161033270bbf25d26 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200609-15">
<title>GnuTLS: RSA Signature Forgery</title>
GnuTLS fails to handle excess data which could allow an attacker to forge a
PKCS #1 v1.5 signature.
<product type="ebuild">gnutls</product>
<announced>September 26, 2006</announced>
<revised>September 26, 2006: 01</revised>
<package name="net-libs/gnutls" auto="yes" arch="*">
<unaffected range="ge">1.4.4</unaffected>
<vulnerable range="lt">1.4.4</vulnerable>
GnuTLS is an implementation of SSL 3.0 and TLS 1.0.
verify.c fails to properly handle excess data in
digestAlgorithm.parameters field while generating a hash when using an
RSA key with exponent 3. RSA keys that use exponent 3 are commonplace.
<impact type="normal">
Remote attackers could forge PKCS #1 v1.5 signatures that are signed
with an RSA key, preventing GnuTLS from correctly verifying X.509 and
other certificates that use PKCS.
There is no known workaround at this time.
All GnuTLS users should update both packages:
# emerge --sync
# emerge --update --ask --verbose &quot;&gt;=net-libs/gnutls-1.4.4&quot;</code>
<uri link="">CVE-2006-4790</uri>
<metadata tag="requester" timestamp="Sat, 23 Sep 2006 06:35:02 +0000">
<metadata tag="submitter" timestamp="Mon, 25 Sep 2006 13:07:32 +0000">
<metadata tag="bugReady" timestamp="Mon, 25 Sep 2006 18:24:37 +0000">