|Description||Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 184.108.40.206, Thunderbird before 220.127.116.11, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|References||DSA-1224-1, DSA-1225-1, DSA-1227-1|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|firefox-esr (PTS)||wheezy (security)||45.3.0esr-1~deb7u1||fixed|
|iceweasel (PTS)||wheezy (security), wheezy||38.8.0esr-1~deb7u1||fixed|
|jessie (security), jessie||38.8.0esr-1~deb8u1||fixed|
|xulrunner (PTS)||wheezy (security), wheezy||24.8.1esr-2~deb7u1||fixed|
The information below is based on the following data on fixed versions.
this is the similar to CVE-2006-4339, see also CVE-2006-4340
the fixes for CVE-2006-4340 were incomplete