{"vuid":"VU#335392","idnumber":"335392","name":"The Mozilla Network Security Services library fails to properly verify RSA signatures","keywords":["Network Security Services","NSSsecurity/nss/lib/softoken/rsawrapr.c","RSA signature","mozilla_1508"],"overview":"The Mozilla Network Security Services library fails to properly verify RSA signatures. This vulnerability may allow an attacker to forge RSA signatures.","clean_desc":"RSA signatures are used to authenticate the source of a message. To prevent RSA signatures from being forged, messages are padded with data to ensure message hashes are adequately sized. The Mozilla Network Security Services (NSS) library fails to properly verify the padding in RSA signatures, ignoring data at the end of a signature. If this data is ignored and an RSA key with a public exponent of three is used, it may be possible to forge the signing key's signature. For more information refer to Mozilla Foundation Security Advisory 2006-66. This vulnerability may affect any application that uses the Mozilla NSS librbary, including SSL/TLS and email certificates.","impact":"This vulnerability may allow an attacker to forge an RSA signature.","resolution":"Apply an update\nAccording to the Mozilla Foundation Security Advisory 2006-66, this vulnerability is addressed in Firefox 1.5.0.8, Thunderbird 1.5.0.8, and SeaMonkey 1.0.6. Note that according to Mozilla: Firefox 1.5.0.x will be maintained with security and stability updates until April 24, 2007. All users are strongly encouraged to upgrade to Firefox 2.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in \nMozilla Foundation Security Advisory 2006-66\n. Mozilla credits Ulrich Kuehn for providing information concerning this issue.","author":"This document was written by Chris Taschner.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-60.html","http://www.mozilla.org/security/announce/2006/mfsa2006-66.html","https://bugzilla.mozilla.org/show_bug.cgi?id=356215","http://secunia.com/advisories/22929/","http://secunia.com/advisories/22980/","http://secunia.com/advisories/23013/","http://secunia.com/advisories/22763/","http://secunia.com/advisories/23009/","http://secunia.com/advisories/22815/","http://secunia.com/advisories/22727/","http://secunia.com/advisories/22770/","http://secunia.com/advisories/22722/","http://secunia.com/advisories/23883/","http://www.securityfocus.com/bid/19849"],"cveids":["CVE-2006-5462"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-03T15:34:31Z","publicdate":"2006-11-08T00:00:00Z","datefirstpublished":"2006-11-08T15:33:25Z","dateupdated":"2007-01-23T19:48:39Z","revision":49,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"13","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"6","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.56","cam_scorecurrentwidelyknown":"8.91","cam_scorecurrentwidelyknownexploited":"14.31","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.56,"vulnote":null}