Vulnerabilidad en algoritmo MD5 Message-Digest (CVE-2004-2761)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-310
Errores criptográficos
Fecha de publicación:
05/01/2009
Última modificación:
09/04/2025
Descripción
El algoritmo MD5 Message-Digest no resistente a colisión, el cual hace más fácil para atacantes dependientes de contexto, llevar a cabo ataques de suplantación, como lo demuestran los ataques de utilización de MD5 en la firma del algoritmo de un certificado X.509.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:ietf:md5:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:ietf:x.509_certificate:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/
- http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx
- http://secunia.com/advisories/33826
- http://secunia.com/advisories/34281
- http://secunia.com/advisories/42181
- http://securityreason.com/securityalert/4866
- http://securitytracker.com/id?1024697=
- http://www.cisco.com/en/US/products/products_security_response09186a0080a5d24a.html
- http://www.doxpara.com/research/md5/md5_someday.pdf
- http://www.kb.cert.org/vuls/id/836068
- http://www.microsoft.com/technet/security/advisory/961509.mspx
- http://www.phreedom.org/research/rogue-ca/
- http://www.securityfocus.com/archive/1/499685/100/0/threaded
- http://www.securityfocus.com/bid/33065
- http://www.ubuntu.com/usn/usn-740-1
- http://www.win.tue.nl/hashclash/SoftIntCodeSign/
- http://www.win.tue.nl/hashclash/rogue-ca/
- https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php
- https://bugzilla.redhat.com/show_bug.cgi?id=648886
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://rhn.redhat.com/errata/RHSA-2010-0837.html
- https://rhn.redhat.com/errata/RHSA-2010-0838.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03814en_us
- https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00096.html
- http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/
- http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx
- http://secunia.com/advisories/33826
- http://secunia.com/advisories/34281
- http://secunia.com/advisories/42181
- http://securityreason.com/securityalert/4866
- http://securitytracker.com/id?1024697=
- http://www.cisco.com/en/US/products/products_security_response09186a0080a5d24a.html
- http://www.doxpara.com/research/md5/md5_someday.pdf
- http://www.kb.cert.org/vuls/id/836068
- http://www.microsoft.com/technet/security/advisory/961509.mspx
- http://www.phreedom.org/research/rogue-ca/
- http://www.securityfocus.com/archive/1/499685/100/0/threaded
- http://www.securityfocus.com/bid/33065
- http://www.ubuntu.com/usn/usn-740-1
- http://www.win.tue.nl/hashclash/SoftIntCodeSign/
- http://www.win.tue.nl/hashclash/rogue-ca/
- https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php
- https://bugzilla.redhat.com/show_bug.cgi?id=648886
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://rhn.redhat.com/errata/RHSA-2010-0837.html
- https://rhn.redhat.com/errata/RHSA-2010-0838.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03814en_us
- https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00096.html