{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2006-5462","title":"Title"},{"category":"description","text":"Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.8, Thunderbird before 1.5.0.8, and SeaMonkey before 1.0.6, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates. NOTE: this identifier is for unpatched product versions that were originally intended to be addressed by CVE-2006-4340.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2006-5462","url":"https://www.suse.com/security/cve/CVE-2006-5462"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 214895 for CVE-2006-5462","url":"https://bugzilla.suse.com/214895"},{"category":"external","summary":"Advisory link for SUSE-SA:2006:068","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E5BYURQCCFLH6SEXWWNG5VHH2BHYJR2C/#E5BYURQCCFLH6SEXWWNG5VHH2BHYJR2C"}],"title":"SUSE CVE CVE-2006-5462","tracking":{"current_release_date":"2024-09-08T05:50:04Z","generator":{"date":"2023-02-15T06:14:08Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2006-5462","initial_release_date":"2023-02-15T06:14:08Z","revision_history":[{"date":"2023-02-15T06:14:08Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:19:57Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:41:49Z","number":"4","summary":"Current version"},{"date":"2024-09-08T05:50:04Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}