Executive Summary

Informations
NameCVE-2004-2761First vendor Publication2009-01-05
VendorCveLast vendor Modification2010-11-19

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2761

CWE : Common Weakness Enumeration

idName
CWE-310Cryptographic Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1

OpenVAS Exploits

DateDescription
2009-03-20Name : Ubuntu USN-735-1 (gst-plugins-base0.10)
File : nvt/ubuntu_735_1.nasl
2009-03-20Name : Ubuntu USN-736-1 (gst-plugins-good0.10)
File : nvt/ubuntu_736_1.nasl
2009-03-20Name : Ubuntu USN-737-1 (libsoup)
File : nvt/ubuntu_737_1.nasl
2009-03-20Name : Ubuntu USN-739-1 (amarok)
File : nvt/ubuntu_739_1.nasl
2009-03-20Name : Ubuntu USN-740-1 (firefox)
File : nvt/ubuntu_740_1.nasl
2009-02-10Name : Fedora Core 9 FEDORA-2009-1276 (nss)
File : nvt/fcore_2009_1276.nasl
2009-02-10Name : Fedora Core 10 FEDORA-2009-1291 (nss)
File : nvt/fcore_2009_1291.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
45127MD5 Algorithm Hash Function Collision Weakness

Nessus® Vulnerability Scanner

DateDescription
2009-04-23Name : The remote Fedora host is missing a security update.
File : fedora_2009-1291.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-740-1.nasl - Type : ACT_GATHER_INFO
2009-02-05Name : The remote Fedora host is missing a security update.
File : fedora_2009-1276.nasl - Type : ACT_GATHER_INFO
2009-01-05Name : An SSL certificate in the certificate chain has been signed using a weak hash...
File : ssl_weak_hash.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
BIDhttp://www.securityfocus.com/bid/33065
BUGTRAQhttp://www.securityfocus.com/archive/1/archive/1/499685/100/0/threaded
CERT-VNhttp://www.kb.cert.org/vuls/id/836068
CISCOhttp://www.cisco.com/en/US/products/products_security_response09186a0080a5d24...
CONFIRMhttps://bugzilla.redhat.com/show_bug.cgi?id=648886
FEDORAhttps://www.redhat.com/archives/fedora-package-announce/2009-February/msg0009...
MISChttp://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-cert...
http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-col...
http://www.doxpara.com/research/md5/md5_someday.pdf
http://www.microsoft.com/technet/security/advisory/961509.mspx
http://www.phreedom.org/research/rogue-ca/
http://www.win.tue.nl/hashclash/rogue-ca/
http://www.win.tue.nl/hashclash/SoftIntCodeSign/
https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php
REDHAThttps://rhn.redhat.com/errata/RHSA-2010-0837.html
https://rhn.redhat.com/errata/RHSA-2010-0838.html
SECTRACKhttp://securitytracker.com/id?1024697
SECUNIAhttp://secunia.com/advisories/33826
http://secunia.com/advisories/34281
http://secunia.com/advisories/42181
SREASONhttp://securityreason.com/securityalert/4866
UBUNTUhttp://www.ubuntu.com/usn/usn-740-1

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:29:35
  • Multiple Updates
2013-05-11 11:49:54
  • Multiple Updates