This script is Copyright (C) 2007-2010 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch
The remote host is missing the patch for the advisory SUSE-SA:2006:055 (openssl,mozilla-nss).
If an RSA key with exponent 3 is used it may be possible to forge a
PKCS verify the certificate if they are not checking for excess data
in the RSA exponentiation result of the signature.
This problems affects various SSL implementations. This advisory
covers the following implementations:
- OpenSSL (CVE-2006-4339)
- Mozilla NSS (CVE-2006-4340 and CVE-2006-4341)
for SUSE Linux 10.0, 10.1 and SUSE Linux Enterprise 10.
Implementations that are affected and still need to be updated:
- gnutls in all distributions.
- Mozilla NSS before SUSE Linux 10.0 and SUSE Linux Enterprise 10.
The official openssl advisory is here:
Some details of the actual technical problem can be found here:
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now