Description
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
Published: 2005-10-18
Score: 5.0 Medium
EPSS: 9.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-875-1 New OpenSSL packages fix cryptographic weakness
Debian DSA Debian DSA DSA-881-1 New OpenSSL 0.9.6 packages fix cryptographic weakness
Debian DSA Debian DSA DSA-882-1 New OpenSSL packages fix cryptographic weakness
Debian DSA Debian DSA DSA-888-1 New OpenSSL packages fix cryptographic weakness
Ubuntu USN Ubuntu USN USN-204-1 SSL library vulnerability
References
Link Providers
ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=302847 cve-icon cve-icon
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00805100 cve-icon cve-icon
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00849540 cve-icon cve-icon
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html cve-icon cve-icon
http://secunia.com/advisories/17146 cve-icon cve-icon
http://secunia.com/advisories/17151 cve-icon cve-icon
http://secunia.com/advisories/17153 cve-icon cve-icon
http://secunia.com/advisories/17169 cve-icon cve-icon
http://secunia.com/advisories/17178 cve-icon cve-icon
http://secunia.com/advisories/17180 cve-icon cve-icon
http://secunia.com/advisories/17189 cve-icon cve-icon
http://secunia.com/advisories/17191 cve-icon cve-icon
http://secunia.com/advisories/17210 cve-icon cve-icon
http://secunia.com/advisories/17259 cve-icon cve-icon
http://secunia.com/advisories/17288 cve-icon cve-icon
http://secunia.com/advisories/17335 cve-icon cve-icon
http://secunia.com/advisories/17344 cve-icon cve-icon
http://secunia.com/advisories/17389 cve-icon cve-icon
http://secunia.com/advisories/17409 cve-icon cve-icon
http://secunia.com/advisories/17432 cve-icon cve-icon
http://secunia.com/advisories/17466 cve-icon cve-icon
http://secunia.com/advisories/17589 cve-icon cve-icon
http://secunia.com/advisories/17617 cve-icon cve-icon
http://secunia.com/advisories/17632 cve-icon cve-icon
http://secunia.com/advisories/17813 cve-icon cve-icon
http://secunia.com/advisories/17888 cve-icon cve-icon
http://secunia.com/advisories/18045 cve-icon cve-icon
http://secunia.com/advisories/18123 cve-icon cve-icon
http://secunia.com/advisories/18165 cve-icon cve-icon
http://secunia.com/advisories/18663 cve-icon cve-icon
http://secunia.com/advisories/19185 cve-icon cve-icon
http://secunia.com/advisories/21827 cve-icon cve-icon
http://secunia.com/advisories/23280 cve-icon cve-icon
http://secunia.com/advisories/23340 cve-icon cve-icon
http://secunia.com/advisories/23843 cve-icon cve-icon
http://secunia.com/advisories/23915 cve-icon cve-icon
http://secunia.com/advisories/25973 cve-icon cve-icon
http://secunia.com/advisories/26893 cve-icon cve-icon
http://secunia.com/advisories/31492 cve-icon cve-icon
http://securitytracker.com/id?1015032 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101974-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754 cve-icon cve-icon
http://www.cisco.com/warp/public/707/cisco-response-20051202-openssl.shtml cve-icon cve-icon
http://www.debian.org/security/2005/dsa-875 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-881 cve-icon cve-icon
http://www.debian.org/security/2005/dsa-882 cve-icon cve-icon
http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html cve-icon cve-icon
http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html cve-icon cve-icon
http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2005:179 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2005_61_openssl.html cve-icon cve-icon
http://www.openssl.org/news/secadv_20051011.txt cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-762.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-800.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2008-0629.html cve-icon cve-icon
http://www.securityfocus.com/bid/15071 cve-icon cve-icon
http://www.securityfocus.com/bid/15647 cve-icon cve-icon
http://www.securityfocus.com/bid/24799 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2036 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2659 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2710 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/2908 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/3002 cve-icon cve-icon
http://www.vupen.com/english/advisories/2005/3056 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3531 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0326 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/0343 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/2457 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/35287 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1633 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2005-2969 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2005-2969 cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.08921}

epss

{'score': 0.08313}


Subscriptions

Openssl Openssl
Redhat Enterprise Linux Network Satellite Stronghold
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T22:53:29.946Z

Reserved: 2005-09-19T00:00:00.000Z

Link: CVE-2005-2969

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-10-18T21:02:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2005-2969

cve-icon Redhat

Severity : Moderate

Publid Date: 2005-10-11T00:00:00Z

Links: CVE-2005-2969 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses