Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1224-1 | New Mozilla packages fix several vulnerabilities |
![]() |
DSA-1225-1 | New Mozilla Firefox packages fix several vulnerabilities |
![]() |
DSA-1225-2 | New Mozilla Firefox packages fix several vulnerabilities |
![]() |
DSA-1227-1 | New Mozilla Thunderbird packages fix several vulnerabilities |
![]() |
USN-381-1 | Firefox vulnerabilities |
![]() |
USN-382-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T19:48:30.553Z
Reserved: 2006-10-23T00:00:00
Link: CVE-2006-5462

No data.

Status : Deferred
Published: 2006-11-08T21:07:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-5462


No data.