VYPR
High severity7.5NVD Advisory· Published Sep 16, 2005· Updated Apr 16, 2026

CVE-2005-2946

CVE-2005-2946

Description

The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.

Affected products

3
  • cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
    Range: <0.9.8
  • cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.