- Description
- The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-295
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3306EB88-CE4C-4D5E-BE35-53DE6DEC5C3C",
"versionEndExcluding": "2.6.4"
},
{
"criteria": "cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "66221847-4F1D-4F26-8916-731BDFE5B3A9",
"versionEndExcluding": "2.7.4",
"versionStartIncluding": "2.7.0"
},
{
"criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A21F310D-7D9F-45D7-974D-C615F99FBEB8",
"versionEndExcluding": "3.12.3"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06458D9A-4AB2-4B8A-8902-D2A285801347",
"versionEndIncluding": "0.9.8k",
"versionStartIncluding": "0.9.8"
}
],
"operator": "OR"
}
]
}
]