Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2006-2940

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.166
EPSS Ranking 94.5%
CVSS Severity
CVSS v2 Score 7.8
References
Products affected by CVE-2006-2940
  • Openssl » Openssl » Version: 0.9.1c
    cpe:2.3:a:openssl:openssl:0.9.1c
  • Openssl » Openssl » Version: 0.9.2b
    cpe:2.3:a:openssl:openssl:0.9.2b
  • Openssl » Openssl » Version: 0.9.3
    cpe:2.3:a:openssl:openssl:0.9.3
  • Openssl » Openssl » Version: 0.9.3a
    cpe:2.3:a:openssl:openssl:0.9.3a
  • Openssl » Openssl » Version: 0.9.4
    cpe:2.3:a:openssl:openssl:0.9.4
  • Openssl » Openssl » Version: 0.9.5
    cpe:2.3:a:openssl:openssl:0.9.5
  • Openssl » Openssl » Version: 0.9.5a
    cpe:2.3:a:openssl:openssl:0.9.5a
  • Openssl » Openssl » Version: 0.9.6
    cpe:2.3:a:openssl:openssl:0.9.6
  • Openssl » Openssl » Version: 0.9.6a
    cpe:2.3:a:openssl:openssl:0.9.6a
  • Openssl » Openssl » Version: 0.9.6b
    cpe:2.3:a:openssl:openssl:0.9.6b
  • Openssl » Openssl » Version: 0.9.6c
    cpe:2.3:a:openssl:openssl:0.9.6c
  • Openssl » Openssl » Version: 0.9.6d
    cpe:2.3:a:openssl:openssl:0.9.6d
  • Openssl » Openssl » Version: 0.9.6e
    cpe:2.3:a:openssl:openssl:0.9.6e
  • Openssl » Openssl » Version: 0.9.6f
    cpe:2.3:a:openssl:openssl:0.9.6f
  • Openssl » Openssl » Version: 0.9.6g
    cpe:2.3:a:openssl:openssl:0.9.6g
  • Openssl » Openssl » Version: 0.9.6h
    cpe:2.3:a:openssl:openssl:0.9.6h
  • Openssl » Openssl » Version: 0.9.6i
    cpe:2.3:a:openssl:openssl:0.9.6i
  • Openssl » Openssl » Version: 0.9.6j
    cpe:2.3:a:openssl:openssl:0.9.6j
  • Openssl » Openssl » Version: 0.9.6k
    cpe:2.3:a:openssl:openssl:0.9.6k
  • Openssl » Openssl » Version: 0.9.6l
    cpe:2.3:a:openssl:openssl:0.9.6l
  • Openssl » Openssl » Version: 0.9.6m
    cpe:2.3:a:openssl:openssl:0.9.6m
  • Openssl » Openssl » Version: 0.9.7
    cpe:2.3:a:openssl:openssl:0.9.7
  • Openssl » Openssl » Version: 0.9.7a
    cpe:2.3:a:openssl:openssl:0.9.7a
  • Openssl » Openssl » Version: 0.9.7b
    cpe:2.3:a:openssl:openssl:0.9.7b
  • Openssl » Openssl » Version: 0.9.7c
    cpe:2.3:a:openssl:openssl:0.9.7c
  • Openssl » Openssl » Version: 0.9.7d
    cpe:2.3:a:openssl:openssl:0.9.7d
  • Openssl » Openssl » Version: 0.9.7e
    cpe:2.3:a:openssl:openssl:0.9.7e
  • Openssl » Openssl » Version: 0.9.7f
    cpe:2.3:a:openssl:openssl:0.9.7f
  • Openssl » Openssl » Version: 0.9.7g
    cpe:2.3:a:openssl:openssl:0.9.7g
  • Openssl » Openssl » Version: 0.9.7h
    cpe:2.3:a:openssl:openssl:0.9.7h
  • Openssl » Openssl » Version: 0.9.7i
    cpe:2.3:a:openssl:openssl:0.9.7i
  • Openssl » Openssl » Version: 0.9.7j
    cpe:2.3:a:openssl:openssl:0.9.7j
  • Openssl » Openssl » Version: 0.9.7k
    cpe:2.3:a:openssl:openssl:0.9.7k
  • Openssl » Openssl » Version: 0.9.8
    cpe:2.3:a:openssl:openssl:0.9.8
  • Openssl » Openssl » Version: 0.9.8a
    cpe:2.3:a:openssl:openssl:0.9.8a
  • Openssl » Openssl » Version: 0.9.8b
    cpe:2.3:a:openssl:openssl:0.9.8b
  • Openssl » Openssl » Version: 0.9.8c
    cpe:2.3:a:openssl:openssl:0.9.8c


Contact Us

Shodan ® - All rights reserved