cve/2005/CVE-2005-2969.md

19 lines
926 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2005-2969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
### POC
#### Reference
2024-07-25 21:25:12 +00:00
- http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/chnzzh/OpenSSL-CVE-lib