{"vuid":"VU#423396","idnumber":"423396","name":"X.509 certificate verification may be vulnerable to resource exhaustion","keywords":["X.509","Certificate verification","DoS","denial of service","Parasitic Keys","resource exhaustion","openssl_secadv_20060928","apple-2006-007","oracle_cpu_jan_2007","OHS07"],"overview":"Some applications that perform X.509 certificate verification may be vulnerable to signature processing problems that lead to resource exhaustion. This vulnerability may cause a denial of service.","clean_desc":"Included in X.509 certificates are public keys used for digital signature verification. Choosing very large values for the public exponent and public modulus associated with an RSA public key may cause the verification of that key to require large amounts of system resources. According to NISCC: ...by choosing much larger values for [the public exponent and the public modulus], it may be possible to cause the verification process to consume large amounts of system resources and hence result in a denial-of-service condition. This vulnerability can be triggered by sending a message signed using specially crafted RSA keys to affected products. A number of different products that verify RSA signatures may be vulnerable to this issue. Please see the Systems Affected section of this document for specific product information.","impact":"A remote, unauthenticated attacker could consume large amounts of system resources on an affected device, thereby creating a denial of service.","resolution":"Upgrade or apply a patch from the vendor\nPatches have been released to address this issue. See the systems affected section of this document for information about specific vendors.","workarounds":"","sysaffected":"","thanks":"NISCC credits Dr. Stephen N. Henson for reporting this vulnerability. This issue was originally reported in GnuTLS by Patrik Hornik.","author":"This document was written by Chris Taschner.","public":["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2531","http://www.hornik.sk/SA/SA-20040802.txt","http://www.gnu.org/software/gnutls/","http://www.securitytracker.com/alerts/2004/Aug/1010838.html","http://www.niscc.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en","http://www.openssl.org/news/secadv_20060928.txt","http://secunia.com/advisories/23280/","http://secunia.com/advisories/23309/","http://secunia.com/advisories/23351/","http://www.securityfocus.com/bid/22083","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1"],"cveids":["CVE-2006-2940"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-22T13:30:05Z","publicdate":"2004-08-02T00:00:00Z","datefirstpublished":"2006-09-28T18:51:56Z","dateupdated":"2007-02-09T21:30:58Z","revision":63,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"20","cam_impact":"3","cam_easeofexploitation":"16","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.92","cam_scorecurrentwidelyknown":"11.52","cam_scorecurrentwidelyknownexploited":"18.72","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.92,"vulnote":null}