CVE DATABASE / CVE-2005-2946
CVE-2005-2946
CVSS 7.5 · HIGH
Summary
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message digests instead of a more cryptographically strong algorithm, which makes it easier for remote attackers to forge certificates with a valid certificate authority signature.
CVSS 3.1 breakdown
| Base score | 7.5 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity | HIGH |
| Availability | NONE |
Weakness type (CWE)
Affected products
Openssl opensslCanonical ubuntu linux
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://www.cits.rub.de/MD5Collisions/
- http://www.ubuntu.com/usn/usn-179-1
- https://bugzilla.ubuntu.com/show_bug.cgi?id=13593
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.