mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
423 lines
17 KiB
JSON
423 lines
17 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2006-4340",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "n/a",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://secunia.com/advisories/22055",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22055"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22066",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22066"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22210",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22210"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22342",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22342"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/usn-350-1",
|
|
"refsource": "MISC",
|
|
"name": "http://www.ubuntu.com/usn/usn-350-1"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/usn-354-1",
|
|
"refsource": "MISC",
|
|
"name": "http://www.ubuntu.com/usn/usn-354-1"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/usn-361-1",
|
|
"refsource": "MISC",
|
|
"name": "http://www.ubuntu.com/usn/usn-361-1"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3748",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2006/3748"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/0083",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2008/0083"
|
|
},
|
|
{
|
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc",
|
|
"refsource": "MISC",
|
|
"name": "ftp://patches.sgi.com/support/free/security/advisories/20060901-01-P.asc"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21903",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21903"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21906",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21906"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21915",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21915"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21916",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21916"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21939",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21939"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21940",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21940"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21949",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21949"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/21950",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/21950"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22001",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22001"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22025",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22025"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22036",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22036"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22044",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22044"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22056",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22056"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22074",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22074"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22088",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22088"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22195",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22195"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22226",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22226"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22247",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22247"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22274",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22274"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22299",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22299"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22422",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22422"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22446",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22446"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22849",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22849"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/22992",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/22992"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/23883",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/23883"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/24711",
|
|
"refsource": "MISC",
|
|
"name": "http://secunia.com/advisories/24711"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200609-19.xml",
|
|
"refsource": "MISC",
|
|
"name": "http://security.gentoo.org/glsa/glsa-200609-19.xml"
|
|
},
|
|
{
|
|
"url": "http://security.gentoo.org/glsa/glsa-200610-01.xml",
|
|
"refsource": "MISC",
|
|
"name": "http://security.gentoo.org/glsa/glsa-200610-01.xml"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1016858",
|
|
"refsource": "MISC",
|
|
"name": "http://securitytracker.com/id?1016858"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1016859",
|
|
"refsource": "MISC",
|
|
"name": "http://securitytracker.com/id?1016859"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1016860",
|
|
"refsource": "MISC",
|
|
"name": "http://securitytracker.com/id?1016860"
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1",
|
|
"refsource": "MISC",
|
|
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1"
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1",
|
|
"refsource": "MISC",
|
|
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1"
|
|
},
|
|
{
|
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm",
|
|
"refsource": "MISC",
|
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm"
|
|
},
|
|
{
|
|
"url": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm",
|
|
"refsource": "MISC",
|
|
"name": "http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2006/dsa-1192",
|
|
"refsource": "MISC",
|
|
"name": "http://www.debian.org/security/2006/dsa-1192"
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2006/dsa-1210",
|
|
"refsource": "MISC",
|
|
"name": "http://www.debian.org/security/2006/dsa-1210"
|
|
},
|
|
{
|
|
"url": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml",
|
|
"refsource": "MISC",
|
|
"name": "http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml"
|
|
},
|
|
{
|
|
"url": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168",
|
|
"refsource": "MISC",
|
|
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:168"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169",
|
|
"refsource": "MISC",
|
|
"name": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:169"
|
|
},
|
|
{
|
|
"url": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/",
|
|
"refsource": "MISC",
|
|
"name": "http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/"
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-60.html"
|
|
},
|
|
{
|
|
"url": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.mozilla.org/security/announce/2006/mfsa2006-66.html"
|
|
},
|
|
{
|
|
"url": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.novell.com/linux/security/advisories/2006_54_mozilla.html"
|
|
},
|
|
{
|
|
"url": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.novell.com/linux/security/advisories/2006_55_ssl.html"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0675.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.redhat.com/support/errata/RHSA-2006-0675.html"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0676.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.redhat.com/support/errata/RHSA-2006-0676.html"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2006-0677.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.redhat.com/support/errata/RHSA-2006-0677.html"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/446140/100/0/threaded",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securityfocus.com/archive/1/446140/100/0/threaded"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/usn-351-1",
|
|
"refsource": "MISC",
|
|
"name": "http://www.ubuntu.com/usn/usn-351-1"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/usn-352-1",
|
|
"refsource": "MISC",
|
|
"name": "http://www.ubuntu.com/usn/usn-352-1"
|
|
},
|
|
{
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html",
|
|
"refsource": "MISC",
|
|
"name": "http://www.us-cert.gov/cas/techalerts/TA06-312A.html"
|
|
},
|
|
{
|
|
"url": "http://www.us.debian.org/security/2006/dsa-1191",
|
|
"refsource": "MISC",
|
|
"name": "http://www.us.debian.org/security/2006/dsa-1191"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3617",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2006/3617"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3622",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2006/3622"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/3899",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2006/3899"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/0293",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2007/0293"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2007/1198",
|
|
"refsource": "MISC",
|
|
"name": "http://www.vupen.com/english/advisories/2007/1198"
|
|
},
|
|
{
|
|
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742",
|
|
"refsource": "MISC",
|
|
"name": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098",
|
|
"refsource": "MISC",
|
|
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30098"
|
|
},
|
|
{
|
|
"url": "https://issues.rpath.com/browse/RPL-640",
|
|
"refsource": "MISC",
|
|
"name": "https://issues.rpath.com/browse/RPL-640"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007",
|
|
"refsource": "MISC",
|
|
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11007"
|
|
}
|
|
]
|
|
}
|
|
} |