漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The libike library, as used by in.iked, elfsign, and kcfd in Sun Solaris 9 and 10, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents libike from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339.
漏洞信息
N/A
漏洞
N/A
漏洞
Sun Solaris 远程攻击漏洞
漏洞信息
当使用带有exponent 3的RSA key时,被Sun Solaris 9和10中的in.iked,elfsign和kcfd使用的libike库会在生成信息前移除PKCS-1填充,这使得远程攻击者可以伪造一个PKCS #1 v1.5署名。该署名是由RSA key签署的,并且会阻止libike正确的校验使用PKCS #1的X.509证书和其他证书。该漏洞与CVE-2006-4339相似。
漏洞信息
N/A
漏洞
N/A