CVE-2005-2969

NameCVE-2005-2969
DescriptionThe SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-875-1, DSA-881-1, DSA-882-1, DSA-888-1
NVD severitymedium
Debian Bugs333500

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)stretch (security), stretch1.1.0l-1~deb9u1fixed
buster, buster (security)1.1.1d-0+deb10u3fixed
bullseye, sid1.1.1g-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsourcewoody0.9.6c-2.woody.8DSA-888-1
opensslsourcesarge0.9.7e-3sarge1DSA-888-1
opensslsource(unstable)0.9.8-3low333500
openssl094sourcewoody0.9.4-6.woody.4DSA-875-1
openssl094source(unstable)(unfixed)
openssl095sourcewoody0.9.5a-6.woody.6DSA-882-1
openssl095source(unstable)(unfixed)
openssl096sourcesarge0.9.6m-1sarge1DSA-881-1
openssl096source(unstable)(unfixed)
openssl097source(unstable)0.9.7g-5low333500

Search for package or bug name: Reporting problems