aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authornovel <novel@FreeBSD.org>2006-09-11 01:50:17 +0800
committernovel <novel@FreeBSD.org>2006-09-11 01:50:17 +0800
commit1cf395242fa23d79b5f359c592513b78879978c2 (patch)
tree20e142bfb19e843bdac78613ddb1cef8c53cb37c /security
parent25a6624b96dc026fd6fc0a66c460d5d371b998e7 (diff)
downloadfreebsd-ports-gnome-1cf395242fa23d79b5f359c592513b78879978c2.tar.gz
freebsd-ports-gnome-1cf395242fa23d79b5f359c592513b78879978c2.tar.zst
freebsd-ports-gnome-1cf395242fa23d79b5f359c592513b78879978c2.zip
Add an info about GNUTLS-SA-2006-3.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml38
1 files changed, 38 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0e09ca828709..79fed2513964 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,44 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="28ce7102-4039-11db-a838-00148584c7dd">
+ <topic>gnutls -- Adaptive Chosen Ciphertext Attack</topic>
+ <affects>
+ <package>
+ <name>gnutls</name>
+ <range><lt>1.4.3</lt></range>
+ </package>
+ <package>
+ <name>gnutls-devel</name>
+ <range><le>1.5.0</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Simon Josefsson reports:</p>
+ <blockquote cite="http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001203.html">
+ <p><code>_gnutls_handshake_log ("PKCS #1 padding error");
+ ret = GNUTLS_E_PKCS1_WRONG_PAD;</code></p>
+ <p>Werner Koch points out that this error message may result in a
+ vulnerability similar to Bleichenbacher's Crypto 98 attack. It is not
+ exactly the same situation -- Bleichenbacher talks about PKCS#1
+ encryption (block type 1, uses random padding) where this deals with
+ PKCS#1 verification (block type 2, uses 0xFF padding) -- but at a
+ glance, it appears to have similar consequences, but differ in the
+ number of messages required to mount the attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://lists.gnupg.org/pipermail/gnutls-dev/2006-September/001203.html</url>
+ <url>http://www.bell-labs.com/user/bleichen/papers/pkcs.ps</url>
+ </references>
+ <dates>
+ <discovery>2006-09-08</discovery>
+ <entry>2006-09-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="fffa9257-3c17-11db-86ab-00123ffe8333">
<topic>mailman -- Multiple Vulnerabilities</topic>
<affects>