Products
Solutions
Customers
Partner
Resources
Company
Careers
Community

CVE Reference: CVE-2005-2969

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2005-2969

Description:
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/35287

TRUSTIX
  http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html

SUSE
  http://www.novell.com/linux/security/advisories/2005_61_openssl.html

SUNALERT
  http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1

ST
  1015032

SAID
  Secunia Advisory: SA23340
  Secunia Advisory: SA23280
  Secunia Advisory: SA21827
  Secunia Advisory: SA19185
  Secunia Advisory: SA18663
  Secunia Advisory: SA17632
  Secunia Advisory: SA17617
  Secunia Advisory: SA17589
  Secunia Advisory: SA17466
  Secunia Advisory: SA17432
  Secunia Advisory: SA17409
  Secunia Advisory: SA17389
  Secunia Advisory: SA17344
  Secunia Advisory: SA17335
  Secunia Advisory: SA17288
  Secunia Advisory: SA17259
  Secunia Advisory: SA17210
  Secunia Advisory: SA17191
  Secunia Advisory: SA17189
  Secunia Advisory: SA17180
  Secunia Advisory: SA17178
  Secunia Advisory: SA17169
  Secunia Advisory: SA17153
  Secunia Advisory: SA17146
  Secunia Advisory: SA18123
  Secunia Advisory: SA18165
  Secunia Advisory: SA17151
  Secunia Advisory: SA18045
  Secunia Advisory: SA17888
  Secunia Advisory: SA17813
  Secunia Advisory: SA23915
  Secunia Advisory: SA23843
  Secunia Advisory: SA25973
  Secunia Advisory: SA26893
  Secunia Advisory: SA31492

REDHAT
  http://www.redhat.com/support/errata/RHSA-2008-0629.html
  http://www.redhat.com/support/errata/RHSA-2005-800.html
  http://www.redhat.com/support/errata/RHSA-2005-762.html

OVAL
  http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11454

MISC
  http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt
  http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDKSA-2005:179

HP
  http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100
  http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540

FREEBSD

DEBIAN
  http://www.debian.org/security/2005/dsa-881
  http://www.debian.org/security/2005/dsa-882
  http://www.debian.org/security/2005/dsa-875

CONFIRM
  http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html
  http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html
  http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm
  http://www.openssl.org/news/secadv_20051011.txt
  http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm

CISCO
  http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml

BID
  15647
  24799
  15071

APPLE
  http://docs.info.apple.com/article.html?artnum=302847


Return to the previous page.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability