English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 126339 CVE descriptions
and 74190 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:166
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : gnutls
 Date    : September 19, 2006
 Affected: 2006.0, Corporate 4.0
 _______________________________________________________________________
 
 Problem Description:
 
 verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3,
 does not properly handle excess data in the digestAlgorithm.parameters
 field when generating a hash, which allows remote attackers to forge a
 PKCS #1 v1.5 signature that is signed by that RSA key and prevents
 GnuTLS from correctly verifying X.509 and other certificates that use
 PKCS, a variant of CVE-2006-4339.

 The provided packages have been patched to correct this issues.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 7cb7aa3309af51dc44ca8bc9f855bb9b  2006.0/i586/gnutls-1.0.25-2.2.20060mdk.i586.rpm
 e30b5de1b0500830cfbcfbb7a845967d  2006.0/i586/libgnutls11-1.0.25-2.2.20060mdk.i586.rpm
 ddbe8a9d665b50a4614fee5251a8dc39  2006.0/i586/libgnutls11-devel-1.0.25-2.2.20060mdk.i586.rpm 
 aea1556e219f37a6f4be8dadce721830  2006.0/SRPMS/gnutls-1.0.25-2.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 bd9f806eb2319b5d258d142154011650  2006.0/x86_64/gnutls-1.0.25-2.2.20060mdk.x86_64.rpm
 b8046dacc5e4fd5cd11acd7139fba8d9  2006.0/x86_64/lib64gnutls11-1.0.25-2.2.20060mdk.x86_64.rpm
 f26c571f9379dcae4efe5ccb5ddd1bce  2006.0/x86_64/lib64gnutls11-devel-1.0.25-2.2.20060mdk.x86_64.rpm
 e30b5de1b0500830cfbcfbb7a845967d  2006.0/x86_64/libgnutls11-1.0.25-2.2.20060mdk.i586.rpm
 ddbe8a9d665b50a4614fee5251a8dc39  2006.0/x86_64/libgnutls11-devel-1.0.25-2.2.20060mdk.i586.rpm 
 aea1556e219f37a6f4be8dadce721830  2006.0/SRPMS/gnutls-1.0.25-2.2.20060mdk.src.rpm

 Corporate 4.0:
 a2254e8a31891b8bcc609f3cf13c62bb  corporate/4.0/i586/gnutls-1.0.25-2.2.20060mlcs4.i586.rpm
 41b00f4035f895b1e7b51522d1b31342  corporate/4.0/i586/libgnutls11-1.0.25-2.2.20060mlcs4.i586.rpm
 2e74d9730bb73ec4cd4ccd584bd184b9  corporate/4.0/i586/libgnutls11-devel-1.0.25-2.2.20060mlcs4.i586.rpm 
 1e1ff2a8e7eabe7d152c98076f564476  corporate/4.0/SRPMS/gnutls-1.0.25-2.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 05843e5fd72d31c80c5d8218cf18d812  corporate/4.0/x86_64/gnutls-1.0.25-2.2.20060mlcs4.x86_64.rpm
 112708823292a1f1ca17fa68daac8373  corporate/4.0/x86_64/lib64gnutls11-1.0.25-2.2.20060mlcs4.x86_64.rpm
 a0eaae0c87a0a56ef69a11c8db598fb8  corporate/4.0/x86_64/lib64gnutls11-devel-1.0.25-2.2.20060mlcs4.x86_64.rpm
 41b00f4035f895b1e7b51522d1b31342  corporate/4.0/x86_64/libgnutls11-1.0.25-2.2.20060mlcs4.i586.rpm
 2e74d9730bb73ec4cd4ccd584bd184b9  corporate/4.0/x86_64/libgnutls11-devel-1.0.25-2.2.20060mlcs4.i586.rpm 
 1e1ff2a8e7eabe7d152c98076f564476  corporate/4.0/SRPMS/gnutls-1.0.25-2.2.20060mlcs4.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFFEawJmqjQ0CJFipgRAqFdAKC44hSOcU7Pqbt7V0XHz9HHDIKbqwCfUWK1
FGp443EESX1+sjPf4EDaEwQ=
=Lqox
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.