The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
References
Link | Resource |
---|---|
http://www.cits.rub.de/MD5Collisions/ | Broken Link |
http://www.ubuntu.com/usn/usn-179-1 | Vendor Advisory |
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 | Broken Link Issue Tracking Vendor Advisory |
http://www.cits.rub.de/MD5Collisions/ | Broken Link |
http://www.ubuntu.com/usn/usn-179-1 | Vendor Advisory |
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593 | Broken Link Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2005-09-16 22:03
Updated : 2025-04-03 01:03
NVD link : CVE-2005-2946
Mitre link : CVE-2005-2946
CVE.ORG link : CVE-2005-2946
JSON object : View
Products Affected
openssl
- openssl
canonical
- ubuntu_linux
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm