First published: Tue Oct 18 2005(Updated: )
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =0.9.7c | |
OpenSSL libcrypto | =0.9.7g | |
OpenSSL libcrypto | =0.9.7d | |
OpenSSL libcrypto | =0.9.7 | |
OpenSSL libcrypto | =0.9.7e | |
OpenSSL libcrypto | =0.9.7b | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.7a | |
OpenSSL libcrypto | =0.9.7f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2969 has a moderate severity rating due to its exploitation potential in SSL/TLS communication.
To fix CVE-2005-2969, upgrade OpenSSL to version 0.9.7h or later, or to version 0.9.8a or later.
CVE-2005-2969 affects OpenSSL versions from 0.9.7a to 0.9.7g and 0.9.8 before 0.9.8a.
CVE-2005-2969 allows remote attackers to perform protocol version rollback attacks.
There is no recommended workaround for CVE-2005-2969; upgrading is the only effective mitigation.