Bug 169803 - CVE-2005-2946 openssl insecure default message digest
Summary: CVE-2005-2946 openssl insecure default message digest
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: openssl
Version: 4.0
Hardware: All
OS: Linux
medium
low
Target Milestone: ---
: ---
Assignee: Tomas Mraz
QA Contact: Brian Brock
URL:
Whiteboard: impact=low,source=cve,public=20050716...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-10-03 20:44 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-02-19 14:14:59 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2005-10-03 20:44:35 UTC
The default configuration on OpenSSL before 0.9.8 uses MD5 for creating message
digests instead of a more cryptorgaphically strong algorithm, which makes it
easier for remote attackers to forge certificates with a valid certificate
authority signature.

I'm not sure if this is something we want to or can change in RHEL.  I'm filing
this bug so we have a placeholder for this issue, and so we have a public place
for comments regarding it.

While the weakness of md5 is real, it is not right to blindly proclaim
everything that uses it broken.

Consider this the placeholder for RHEL2, RHEL3 and RHEL4

Comment 1 Josh Bressers 2005-10-03 20:45:24 UTC
There is more information regarding this here:
https://bugzilla.ubuntu.com/show_bug.cgi?id=13593

Comment 2 Tomas Mraz 2005-10-04 13:29:45 UTC
As openssl.cnf is %config(noreplace) for all RHELs I think it shouldn't be a
problem to fix it there too. 


Comment 3 Tomas Mraz 2005-10-07 06:47:25 UTC
It is really debatable if we want to change the default. On systems where
security of issued certificates is really critical the sha1 hash should have
been used a long ago and the default can be easily changed by modification of
the config file. Also this fix is probably not enough as there should be also
some changes on the verification side - at least some warnings when certificates
with MD5 hashes are used or so.


Comment 4 Tomas Mraz 2005-10-12 12:11:13 UTC
I've fixed this (changed the default to sha1) in Fedora Core development package.

Leaving still open for the RHEL 4 and older consideration.


Comment 5 Mark J. Cox 2007-02-19 14:14:59 UTC
won't fix for rhel4/3/2.1


Note You need to log in before you can comment on or make changes to this bug.