CVE-2005-2946

The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
References
Link Resource
http://www.cits.rub.de/MD5Collisions/ Broken Link
http://www.ubuntu.com/usn/usn-179-1 Vendor Advisory
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 Broken Link Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-09-16 22:03

Updated : 2024-02-09 03:13


NVD link : CVE-2005-2946

Mitre link : CVE-2005-2946

CVE.ORG link : CVE-2005-2946


JSON object : View

Products Affected

canonical

  • ubuntu_linux

openssl

  • openssl
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm