CVE-2006-4340

N/A Unknown
Published: September 15, 2006 Modified: April 16, 2026
View on NVD

Description

Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21903
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21906
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21915
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21916
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21939
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21940
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/21949
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/21950
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22001
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22025
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22036
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22044
Source: secalert@redhat.com
http://secunia.com/advisories/22055
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22056
Source: secalert@redhat.com
http://secunia.com/advisories/22066
Source: secalert@redhat.com
http://secunia.com/advisories/22074
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22088
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22195
Source: secalert@redhat.com
http://secunia.com/advisories/22210
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22226
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22247
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22274
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22299
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22342
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22422
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22446
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22849
Source: secalert@redhat.com
http://secunia.com/advisories/22992
Source: secalert@redhat.com
http://secunia.com/advisories/23883
Source: secalert@redhat.com
http://secunia.com/advisories/24711
Source: secalert@redhat.com
http://securitytracker.com/id?1016858
Source: secalert@redhat.com
http://securitytracker.com/id?1016859
Source: secalert@redhat.com
http://securitytracker.com/id?1016860
Source: secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2006-0675.html
Source: secalert@redhat.com
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0676.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.ubuntu.com/usn/usn-350-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-351-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-352-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-354-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-361-1
Source: secalert@redhat.com
http://www.us-cert.gov/cas/techalerts/TA06-312A.html
Source: secalert@redhat.com
US Government Resource
https://issues.rpath.com/browse/RPL-640
Source: secalert@redhat.com
http://secunia.com/advisories/21903
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21906
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21915
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21916
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21939
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21940
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21949
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/21950
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22001
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22025
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22036
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22044
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22055
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22056
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22066
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22074
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22088
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22195
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22226
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22247
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22274
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22299
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22342
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22422
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22446
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22849
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22992
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/23883
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24711
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200609-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200610-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016858
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016859
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016860
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-224.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1192
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1210
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:168
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:169
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-60.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2006/mfsa2006-66.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_55_ssl.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0675.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0676.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0677.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/archive/1/446140/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-350-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-351-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-352-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-354-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-361-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA06-312A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us.debian.org/security/2006/dsa-1191
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3617
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3622
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3748
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3899
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/0293
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/1198
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0083
Source: af854a3a-2127-422b-91ae-364da2661108
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/30098
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-640
Source: af854a3a-2127-422b-91ae-364da2661108

146 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.7%
86th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla