CVE-2005-2969

NameCVE-2005-2969
DescriptionThe SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-875-1, DSA-881-1, DSA-882-1, DSA-888-1
Debian Bugs333500

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)bullseye1.1.1w-0+deb11u1fixed
bullseye (security)1.1.1w-0+deb11u2fixed
bookworm3.0.15-1~deb12u1fixed
bookworm (security)3.0.14-1~deb12u2fixed
sid, trixie3.3.2-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsourcewoody0.9.6c-2.woody.8DSA-888-1
opensslsourcesarge0.9.7e-3sarge1DSA-888-1
opensslsource(unstable)0.9.8-3low333500
openssl094sourcewoody0.9.4-6.woody.4DSA-875-1
openssl094source(unstable)(unfixed)
openssl095sourcewoody0.9.5a-6.woody.6DSA-882-1
openssl095source(unstable)(unfixed)
openssl096sourcesarge0.9.6m-1sarge1DSA-881-1
openssl096source(unstable)(unfixed)
openssl097source(unstable)0.9.7g-5low333500

Search for package or bug name: Reporting problems