CVE-2006-2940
Published: 28 September 2006
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
Priority
Status
Package | Release | Status |
---|---|---|
openssl097 Launchpad, Ubuntu, Debian |
dapper |
Released
(0.9.7g-5ubuntu1.1)
|
edgy |
Released
(0.9.7k-3)
|
|
feisty |
Released
(0.9.7k-3)
|
|
upstream |
Needs triage
|
|
openssl Launchpad, Ubuntu, Debian |
dapper |
Released
(0.9.8a-7ubuntu0.3)
|
edgy |
Released
(0.9.8b-2ubuntu2)
|
|
feisty |
Released
(0.9.8b-2ubuntu2)
|
|
upstream |
Needs triage
|