Vulnerability Details CVE-2005-2946
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.4%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2005-2946
-
cpe:2.3:a:openssl:openssl:-
-
cpe:2.3:a:openssl:openssl:0.9.1c
-
cpe:2.3:a:openssl:openssl:0.9.2b
-
cpe:2.3:a:openssl:openssl:0.9.3
-
cpe:2.3:a:openssl:openssl:0.9.3a
-
cpe:2.3:a:openssl:openssl:0.9.4
-
cpe:2.3:a:openssl:openssl:0.9.5
-
cpe:2.3:a:openssl:openssl:0.9.5a
-
cpe:2.3:a:openssl:openssl:0.9.6
-
cpe:2.3:a:openssl:openssl:0.9.6a
-
cpe:2.3:a:openssl:openssl:0.9.6b
-
cpe:2.3:a:openssl:openssl:0.9.6c
-
cpe:2.3:a:openssl:openssl:0.9.6d
-
cpe:2.3:a:openssl:openssl:0.9.6e
-
cpe:2.3:a:openssl:openssl:0.9.6f
-
cpe:2.3:a:openssl:openssl:0.9.6g
-
cpe:2.3:a:openssl:openssl:0.9.6h
-
cpe:2.3:a:openssl:openssl:0.9.6i
-
cpe:2.3:a:openssl:openssl:0.9.6j
-
cpe:2.3:a:openssl:openssl:0.9.6k
-
cpe:2.3:a:openssl:openssl:0.9.6l
-
cpe:2.3:a:openssl:openssl:0.9.6m
-
cpe:2.3:a:openssl:openssl:0.9.7
-
cpe:2.3:a:openssl:openssl:0.9.7a
-
cpe:2.3:a:openssl:openssl:0.9.7b
-
cpe:2.3:a:openssl:openssl:0.9.7c
-
cpe:2.3:a:openssl:openssl:0.9.7d
-
cpe:2.3:a:openssl:openssl:0.9.7e
-
cpe:2.3:a:openssl:openssl:0.9.7f
-
cpe:2.3:a:openssl:openssl:0.9.7g
-
cpe:2.3:a:openssl:openssl:0.9.7h
-
cpe:2.3:a:openssl:openssl:0.9.7i
-
cpe:2.3:a:openssl:openssl:0.9.7j
-
cpe:2.3:a:openssl:openssl:0.9.7k
-
cpe:2.3:a:openssl:openssl:0.9.7l
-
cpe:2.3:a:openssl:openssl:0.9.7m
-
cpe:2.3:o:canonical:ubuntu_linux:4.10
-
cpe:2.3:o:canonical:ubuntu_linux:5.04