CVE-2005-2969

NameCVE-2005-2969
DescriptionThe SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-875-1, DSA-881-1, DSA-882-1, DSA-888-1
NVD severitymedium (attack range: remote)
Debian Bugs333500

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)wheezy1.0.1e-2+deb7u20fixed
wheezy (security)1.0.1t-1+deb7u2fixed
jessie (security), jessie1.0.1t-1+deb8u6fixed
stretch1.1.0f-3fixed
buster, sid1.1.0f-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)0.9.8-3low333500
opensslsourcesarge0.9.7e-3sarge1mediumDSA-888-1
opensslsourcewoody0.9.6c-2.woody.8mediumDSA-888-1
openssl094source(unstable)(unfixed)medium
openssl094sourcewoody0.9.4-6.woody.4mediumDSA-875-1
openssl095source(unstable)(unfixed)medium
openssl095sourcewoody0.9.5a-6.woody.6mediumDSA-882-1
openssl096source(unstable)(unfixed)medium
openssl096sourcesarge0.9.6m-1sarge1mediumDSA-881-1
openssl097source(unstable)0.9.7g-5low333500

Search for package or bug name: Reporting problems