Bug 897954 (CVE-2005-2946) - VUL-0: CVE-2005-2946: openssl: default hashing method is unsecure
Summary: VUL-0: CVE-2005-2946: openssl: default hashing method is unsecure
Status: RESOLVED UPSTREAM
Alias: CVE-2005-2946
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-23 11:46 UTC by Marcus Meissner
Modified: 2014-09-23 11:51 UTC (History)
0 users

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-09-23 11:46:58 UTC
via CVE db

The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2946
Comment 1 Marcus Meissner 2014-09-23 11:49:37 UTC
"before openssl 0.9.8", so does not affect SUSE Linux Enterprise 11 or newer.
Comment 3 Marcus Meissner 2014-09-23 11:51:11 UTC
sles10 has openssl 0.9.8a, so is also not affected.

/etc/ssl/openssl.cnf line:

default_md      = sha1                  # which md to use.