First published: Fri Sep 15 2006(Updated: )
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <=1.5.0.6 | |
Mozilla NSS ESR | <=3.11.2 | |
Mozilla SeaMonkey | <=1.0.4 | |
Thunderbird | <=1.5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4340 has a medium severity level due to its potential for remote signature forgery.
CVE-2006-4340 affects Mozilla Firefox versions prior to 1.5.0.7, Thunderbird versions prior to 1.5.0.7, SeaMonkey versions prior to 1.0.5, and NSS library versions prior to 3.11.3.
To fix CVE-2006-4340, upgrade your affected software to the latest version that addresses this vulnerability.
CVE-2006-4340 is a cryptographic vulnerability that allows for signature forgery under specific conditions.
CVE-2006-4340 was reported in September 2006.