First published: Wed Nov 08 2006(Updated: )
Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | =1.5.0.7 | |
Mozilla SeaMonkey | =1.0.3 | |
Mozilla Firefox | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0.1 | |
Mozilla Firefox | =1.5.0.6 | |
Mozilla Firefox | =1.5.0.3 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0-beta | |
Mozilla Firefox | =1.5-beta1 | |
Mozilla Firefox | =1.5 | |
Mozilla Thunderbird | =1.5.0.3 | |
Mozilla Thunderbird | =1.5.0.6 | |
Mozilla Thunderbird | =1.5-beta2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0.2 | |
Mozilla Firefox | =1.5.0.7 | |
Mozilla Thunderbird | =1.5 | |
Mozilla Thunderbird | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0.5 | |
Mozilla Firefox | =1.5.0.5 | |
Mozilla Firefox | =1.5.0.2 | |
Mozilla SeaMonkey | =1.0 | |
Mozilla SeaMonkey | =1.0.4 | |
Mozilla Thunderbird | =1.5.0.1 | |
Mozilla Network Security Services | =3.11.3 | |
Mozilla Firefox | =1.5.0.4 | |
Mozilla Firefox | =1.5.0.1 | |
Mozilla Thunderbird | =1.5.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.