Vulnerability Description
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openssl | Openssl | < 0.9.8 |
| Canonical | Ubuntu Linux | 4.10 |
Related Weaknesses (CWE)
References
- http://www.cits.rub.de/MD5Collisions/Broken Link
- http://www.ubuntu.com/usn/usn-179-1Vendor Advisory
- https://bugzilla.ubuntu.com/show_bug.cgi?id=13593Broken LinkIssue TrackingVendor Advisory
- http://www.cits.rub.de/MD5Collisions/Broken Link
- http://www.ubuntu.com/usn/usn-179-1Vendor Advisory
- https://bugzilla.ubuntu.com/show_bug.cgi?id=13593Broken LinkIssue TrackingVendor Advisory
FAQ
What is CVE-2005-2946?
CVE-2005-2946 is a vulnerability with a CVSS score of 7.5 (HIGH). The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certif...
How severe is CVE-2005-2946?
CVE-2005-2946 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2946?
Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Canonical Ubuntu Linux.