Intoto iGateway VPN and iGateway SSL-VPN allow context-dependent attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification, a related issue to CVE-2006-2940.
References
Link | Resource |
---|---|
http://secunia.com/advisories/22206 | Vendor Advisory |
http://www.uniras.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/3859 | |
http://secunia.com/advisories/22206 | Vendor Advisory |
http://www.uniras.gov.uk/niscc/docs/re-20060928-00661.pdf?lang=en | Vendor Advisory |
http://www.vupen.com/english/advisories/2006/3859 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-10-10 04:06
Updated : 2025-04-09 00:30
NVD link : CVE-2006-5179
Mitre link : CVE-2006-5179
CVE.ORG link : CVE-2006-5179
JSON object : View
Products Affected
intoto
- igateway_vpn
- igateway_ssl-vpn
CWE