| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.6 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in VMware Server 1.x. Affected by this vulnerability is an unknown functionality of the component authd. Executing a manipulation can lead to cryptographic issue. This vulnerability is tracked as CVE-2006-4339. No exploit exists. Upgrading the affected component is recommended.
Details
A vulnerability was found in VMware Server 1.x (Virtualization Software). It has been declared as critical. This vulnerability affects an unknown code block of the component authd. The manipulation with an unknown input leads to a cryptographic issue vulnerability. The CWE definition for the vulnerability is CWE-310. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
The weakness was disclosed 03/17/2008 by Daniel Bleichenbacher with Vmware (Website). The advisory is shared for download at vmware.com. This vulnerability was named CVE-2006-4339 since 08/24/2006. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1600.
It is declared as proof-of-concept. As 0-day the estimated underground price was around $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 20055 (Solaris 10 (x86) : 119214-36 (deprecated)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Solaris Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 185039 (HP-UX Running BIND Remote Denial of Service Vulnerability (HPSBUX02219)).
Upgrading eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at vmware.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (28755), Tenable (20055), SecurityFocus (BID 19849†), OSVDB (28549†) and Secunia (SA29412†). The entries VDB-2509, VDB-2544, VDB-2546 and VDB-2883 are pretty similar. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.vmware.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.6
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cryptographic issueCWE: CWE-310
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 20055
Nessus Name: Solaris 10 (x86) : 119214-36 (deprecated)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 57360
OpenVAS Name: Debian Security Advisory DSA 1173-1 (openssl)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Patch: vmware.com
Timeline
10/19/2005 🔍08/24/2006 🔍
09/05/2006 🔍
09/05/2006 🔍
09/05/2006 🔍
09/05/2006 🔍
09/10/2006 🔍
03/17/2008 🔍
03/17/2008 🔍
03/18/2008 🔍
01/13/2025 🔍
Sources
Vendor: vmware.comAdvisory: vmware.com
Researcher: Daniel Bleichenbacher
Organization: Vmware
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2006-4339 (🔍)
GCVE (CVE): GCVE-0-2006-4339
GCVE (VulDB): GCVE-100-3652
OVAL: 🔍
CERT: 🔍
X-Force: 28755
SecurityFocus: 19849 - OpenSSL PKCS Padding RSA Signature Forgery Vulnerability
Secunia: 29412 - VMware Server Multiple Vulnerabilities, Less Critical
OSVDB: 28549 - OpenSSL RSA Key PKCS #1 v1.5 Signature Forgery
SecurityTracker: 1016791
Vupen: ADV-2006-3453
scip Labs: https://www.scip.ch/en/?labs.20060413
See also: 🔍
Entry
Created: 03/18/2008 10:57Updated: 01/13/2025 10:57
Changes: 03/18/2008 10:57 (92), 04/28/2019 15:01 (1), 01/13/2025 10:57 (17)
Complete: 🔍
Cache ID: 216:0AB:103
No comments yet. Languages: en.
Please log in to comment.