First published: Fri Sep 16 2005(Updated: )
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.1c | |
OpenSSL libcrypto | =0.9.2b | |
OpenSSL libcrypto | =0.9.3 | |
OpenSSL libcrypto | =0.9.3a | |
OpenSSL libcrypto | =0.9.4 | |
OpenSSL libcrypto | =0.9.5 | |
OpenSSL libcrypto | =0.9.5-beta1 | |
OpenSSL libcrypto | =0.9.5-beta2 | |
OpenSSL libcrypto | =0.9.5a | |
OpenSSL libcrypto | =0.9.5a-beta1 | |
OpenSSL libcrypto | =0.9.5a-beta2 | |
OpenSSL libcrypto | =0.9.6 | |
OpenSSL libcrypto | =0.9.6-beta1 | |
OpenSSL libcrypto | =0.9.6-beta2 | |
OpenSSL libcrypto | =0.9.6-beta3 | |
OpenSSL libcrypto | =0.9.6a | |
OpenSSL libcrypto | =0.9.6a-beta1 | |
OpenSSL libcrypto | =0.9.6a-beta2 | |
OpenSSL libcrypto | =0.9.6a-beta3 | |
OpenSSL libcrypto | =0.9.6b | |
OpenSSL libcrypto | =0.9.6c | |
OpenSSL libcrypto | =0.9.6d | |
OpenSSL libcrypto | =0.9.6e | |
OpenSSL libcrypto | =0.9.6f | |
OpenSSL libcrypto | =0.9.6g | |
OpenSSL libcrypto | =0.9.6h | |
OpenSSL libcrypto | =0.9.6i | |
OpenSSL libcrypto | =0.9.6j | |
OpenSSL libcrypto | =0.9.6k | |
OpenSSL libcrypto | =0.9.6l | |
OpenSSL libcrypto | =0.9.6m | |
OpenSSL libcrypto | =0.9.7 | |
OpenSSL libcrypto | =0.9.7-beta1 | |
OpenSSL libcrypto | =0.9.7-beta2 | |
OpenSSL libcrypto | =0.9.7-beta3 | |
OpenSSL libcrypto | =0.9.7-beta4 | |
OpenSSL libcrypto | =0.9.7-beta5 | |
OpenSSL libcrypto | =0.9.7-beta6 | |
OpenSSL libcrypto | =0.9.7a | |
OpenSSL libcrypto | =0.9.7b | |
OpenSSL libcrypto | =0.9.7c | |
OpenSSL libcrypto | =0.9.7d | |
OpenSSL libcrypto | =0.9.7e | |
OpenSSL libcrypto | =0.9.7f | |
OpenSSL libcrypto | =0.9.7g | |
OpenSSL libcrypto | <0.9.8 | |
Ubuntu Linux | =4.10 | |
Ubuntu Linux | =5.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2946 is considered a high severity vulnerability due to the potential for certificate forgery.
To fix CVE-2005-2946, upgrade OpenSSL to version 0.9.8 or later where a stronger hashing algorithm is used.
CVE-2005-2946 affects OpenSSL versions earlier than 0.9.8, including all versions from 0.9.1c to 0.9.7g.
CVE-2005-2946 can enable remote attackers to forge certificates, thereby potentially compromising secure communications.
If updating is not an option, consider using external validation of certificates to reduce risk, but the best solution remains to upgrade to a secure version.