Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1224-1 | New Mozilla packages fix several vulnerabilities |
Debian DSA |
DSA-1225-1 | New Mozilla Firefox packages fix several vulnerabilities |
Debian DSA |
DSA-1225-2 | New Mozilla Firefox packages fix several vulnerabilities |
Debian DSA |
DSA-1227-1 | New Mozilla Thunderbird packages fix several vulnerabilities |
Ubuntu USN |
USN-381-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-382-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T19:48:30.553Z
Reserved: 2006-10-23T00:00:00
Link: CVE-2006-5462
No data.
Status : Deferred
Published: 2006-11-08T21:07:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-5462
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN