CVE-2006-5484
Summary
| CVE | CVE-2006-5484 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-10-24 22:07:00 UTC |
| Updated | 2019-08-28 14:49:00 UTC |
| Description | SSH Tectia Client/Server/Connector 5.1.0 and earlier, Manager 2.2.0 and earlier, and other products, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents Tectia from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Ssh | Tectia Client | All | All | All | All |
| Application | Ssh | Tectia Connector | All | All | All | All |
| Application | Ssh | Tectia Manager | All | All | All | All |
| Application | Ssh | Tectia Server | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityTracker.com Archives - (SSH Issues Fix for Tectia Server) OpenSSL RSA Signatures Can Be Forged | SECTRACK | securitytracker.com | Patch, Third Party Advisory, VDB Entry |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | Permissions Required |
| SSH Tectia Products RSA Signature Forgery Vulnerability - Advisories - Secunia | SECUNIA | secunia.com | Patch, Third Party Advisory |
| US-CERT Vulnerability Note VU#845620 | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| SSH - Company - News | CONFIRM | www.ssh.com | Patch, Vendor Advisory |
| SecurityTracker.com Archives - (SSH Issues Fix for Tectia Manager) OpenSSL RSA Signatures Can Be Forged | SECTRACK | securitytracker.com | Patch, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.