ID CVE-2004-2761
Summary The MD5 Message-Digest Algorithm is not collision resistant, which makes it easier for context-dependent attackers to conduct spoofing attacks, as demonstrated by attacks on the use of MD5 in the signature algorithm of an X.509 certificate.
References
Vulnerable Configurations
  • cpe:2.3:a:ietf:md5
    cpe:2.3:a:ietf:md5
  • cpe:2.3:a:ietf:x.509_certificate
    cpe:2.3:a:ietf:x.509_certificate
CVSS
Base: 5.0 (as of 01-02-2017 - 13:48)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
exploit-db via4
description MD5 Message Digest Algorithm Hash Collision Weakness. CVE-2004-2761. Dos exploits for multiple platform
id EDB-ID:24807
last seen 2016-02-03
modified 2004-12-07
published 2004-12-07
reporter Dan Kaminsky
source https://www.exploit-db.com/download/24807/
title MD5 Message Digest Algorithm Hash Collision Weakness
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2009-1276.NASL
    description This updates adds protection against rogue CA that was generated as a proof-of- concept of the MD5 collision attacks against X509 signatures: http://www.win.tue.nl/hashclash/rogue-ca/ , related to CVE-2004-2761. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-24
    plugin id 35595
    published 2009-02-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35595
    title Fedora 9 : nss-3.12.2.0-2.fc9 (2009-1276)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-740-1.NASL
    description The MD5 algorithm is known not to be collision resistant. This update blacklists the proof of concept rogue certificate authority as discussed in http://www.win.tue.nl/hashclash/rogue-ca/. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 37463
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=37463
    title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : nss, firefox vulnerability (USN-740-1)
  • NASL family General
    NASL id SSL_WEAK_HASH_CA.NASL
    description The remote service uses a known CA certificate in the SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g., MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing the attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 95631
    published 2016-12-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=95631
    title SSL Certificate Signed Using Weak Hashing Algorithm (Known CA)
  • NASL family General
    NASL id SSL_WEAK_HASH.NASL
    description The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.
    last seen 2019-02-21
    modified 2018-12-13
    plugin id 35291
    published 2009-01-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=35291
    title SSL Certificate Signed Using Weak Hashing Algorithm
redhat via4
advisories
  • rhsa
    id RHSA-2010:0837
  • rhsa
    id RHSA-2010:0838
refmap via4
bid 33065
bugtraq 20081230 MD5 Considered Harmful Today: Creating a rogue CA certificate
cert-vn VU#836068
cisco 20090115 MD5 Hashes May Allow for Certificate Spoofing
confirm
fedora FEDORA-2009-1276
misc
sectrack 1024697
secunia
  • 33826
  • 34281
  • 42181
sreason 4866
ubuntu USN-740-1
statements via4
contributor Mark J Cox
lastmodified 2009-01-07
organization Red Hat
statement Please see http://kbase.redhat.com/faq/docs/DOC-15379
Last major update 01-02-2017 - 13:53
Published 05-01-2009 - 15:30
Last modified 19-10-2018 - 11:30
Back to Top