search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple RSA implementations fail to properly handle signatures

Vulnerability Note VU#845620

Original Release Date: 2006-09-11 | Last Revised: 2007-02-08

Overview

Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures.

Description

RSA signatures are used to authenticate the source of a message. To prevent RSA signatures from being forged, messages are padded with data to ensure message hashes are adequately sized. One such padding scheme is specified in the Public-Key Cryptography Standard #1 (PKCS-1), which is defined in RFC 3447.

Many RSA implementations may fail to properly verify signatures. Specifically, the verifier may incorrectly parse PKCS-1 padded signatures, ignoring data at the end of a signature. If this data is ignored and a RSA key with a public exponent of three is used, it may be possible to forge the signing key's signature.

Note that any application that uses RSA signatures may be affected by this vulnerability. This includes, but is not limited to, SSH, SSL, PGP, and X.509 applications.

This issue is further discussed on the ietf-openpgp mailing list.

Impact

This vulnerability may allow an attacker to forge an RSA signature.

Solution

Check with your vendor
See the systems affected section of this document for information about how specific vendors are addressing this vulnerability.

Vendor Information

845620
 

View all 132 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Daniel Bleichenbacher.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2006-4339
Severity Metric: 7.56
Date Public: 2006-09-05
Date First Published: 2006-09-11
Date Last Updated: 2007-02-08 15:09 UTC
Document Revision: 104

Sponsored by CISA.