New Search

OpenSSL 0.9.7 before 0.9.7l 0.9.8 before 0.9.8d and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.

oval:org.mitre.oval:def:10311

OpenSSL 0.9.7 before 0.9.7l 0.9.8 before 0.9.8d and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Red Hat Enterprise Linux 3
  • CentOS Linux 4
  • Oracle Linux 4
  • Red Hat Enterprise Linux 4
  • CentOS Linux 3
Class:
vulnerability
Reference(s):
  • CVE-2006-2940
Product(s):