|Description||Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 126.96.36.199, Thunderbird before 188.8.131.52, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 184.108.40.206 are covered by CVE-2006-5462.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
|References||DSA-1191-1, DSA-1192-1, DSA-1210|
Vulnerable and fixed packages
The table below lists information on source packages.
|bookworm, bookworm (security)||1:115.5.0-1~deb12u1||fixed|
The information below is based on the following data on fixed versions.
MFSA-2006-60, this is the similar to CVE-2006-4339