OpenSSL < 0.9.7k / 0.9.8c PKCS Padding RSA Signature Forgery Vulnerability

medium Nessus Plugin ID 17756


The SSL layer on the remote server does not properly verify signatures.


According to its banner, the remote server is running a version of OpenSSL that is earlier than 0.9.7k or 0.9.8c.

These versions do not properly verify PKCS #1 v1.5 signatures and X509 certificates when the RSA exponent is 3.


Upgrade to OpenSSL 0.9.7k / 0.9.8c or later.

See Also

Plugin Details

Severity: Medium

ID: 17756

File Name: openssl_0_9_7k_0_9_8c.nasl

Version: 1.12

Type: combined

Family: Web Servers

Published: 1/4/2012

Updated: 3/27/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 2.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2006-4339


Risk Factor: Medium

Base Score: 5.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Ease: No known exploits are available

Patch Publication Date: 9/5/2006

Vulnerability Publication Date: 9/5/2006

Reference Information

CVE: CVE-2006-4339

BID: 19849

CWE: 310

CERT: 845620