The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
References
Link | Resource |
---|---|
http://www.cits.rub.de/MD5Collisions/ | Broken Link |
http://www.ubuntu.com/usn/usn-179-1 | Vendor Advisory |
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 | Broken Link Issue Tracking Vendor Advisory |
http://www.cits.rub.de/MD5Collisions/ | Broken Link |
http://www.ubuntu.com/usn/usn-179-1 | Vendor Advisory |
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 | Broken Link Issue Tracking Vendor Advisory |
Configurations
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cits.rub.de/MD5Collisions/ - Broken Link | |
References | () http://www.ubuntu.com/usn/usn-179-1 - Vendor Advisory | |
References | () https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 - Broken Link, Issue Tracking, Vendor Advisory |
09 Feb 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical
Canonical ubuntu Linux |
|
CPE | cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-327 | |
References | (MISC) https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 - Broken Link, Issue Tracking, Vendor Advisory | |
References | (MISC) http://www.cits.rub.de/MD5Collisions/ - Broken Link |
Information
Published : 2005-09-16 22:03
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2946
Mitre link : CVE-2005-2946
CVE.ORG link : CVE-2005-2946
JSON object : View
Products Affected
canonical
- ubuntu_linux
openssl
- openssl
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm