// For flags

CVE-2005-2969

openssl mitm downgrade attack

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-09-19 CVE Reserved
  • 2005-10-18 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (76)
URL Tag Source
ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf X_refsource_misc
http://secunia.com/advisories/17146 Third Party Advisory
http://secunia.com/advisories/17151 Third Party Advisory
http://secunia.com/advisories/17153 Third Party Advisory
http://secunia.com/advisories/17169 Third Party Advisory
http://secunia.com/advisories/17178 Third Party Advisory
http://secunia.com/advisories/17180 Third Party Advisory
http://secunia.com/advisories/17189 Third Party Advisory
http://secunia.com/advisories/17191 Third Party Advisory
http://secunia.com/advisories/17210 Third Party Advisory
http://secunia.com/advisories/17259 Third Party Advisory
http://secunia.com/advisories/17288 Third Party Advisory
http://secunia.com/advisories/17335 Third Party Advisory
http://secunia.com/advisories/17344 Third Party Advisory
http://secunia.com/advisories/17389 Third Party Advisory
http://secunia.com/advisories/17409 Third Party Advisory
http://secunia.com/advisories/17432 Third Party Advisory
http://secunia.com/advisories/17466 Third Party Advisory
http://secunia.com/advisories/17589 Third Party Advisory
http://secunia.com/advisories/17617 Third Party Advisory
http://secunia.com/advisories/17632 Third Party Advisory
http://secunia.com/advisories/17813 Third Party Advisory
http://secunia.com/advisories/17888 Third Party Advisory
http://secunia.com/advisories/18045 Third Party Advisory
http://secunia.com/advisories/18123 Third Party Advisory
http://secunia.com/advisories/18165 Third Party Advisory
http://secunia.com/advisories/18663 Third Party Advisory
http://secunia.com/advisories/19185 Third Party Advisory
http://secunia.com/advisories/21827 Third Party Advisory
http://secunia.com/advisories/23280 Third Party Advisory
http://secunia.com/advisories/23340 Third Party Advisory
http://secunia.com/advisories/23843 Third Party Advisory
http://secunia.com/advisories/23915 Third Party Advisory
http://secunia.com/advisories/25973 Third Party Advisory
http://secunia.com/advisories/26893 Third Party Advisory
http://secunia.com/advisories/31492 Third Party Advisory
http://securitytracker.com/id?1015032 Vdb Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-031.htm X_refsource_confirm
http://support.avaya.com/elmodocs2/security/ASA-2006-260.htm X_refsource_confirm
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754 X_refsource_misc
http://www.hitachi-support.com/security_e/vuls_e/HS06-022_e/01-e.html X_refsource_confirm
http://www.hitachi-support.com/security_e/vuls_e/HS07-016_e/index-e.html X_refsource_confirm
http://www.juniper.net/support/security/alerts/PSN-2005-12-025.txt X_refsource_misc
http://www.securityfocus.com/bid/15071 Vdb Entry
http://www.securityfocus.com/bid/15647 Vdb Entry
http://www.securityfocus.com/bid/24799 Vdb Entry
http://www.vupen.com/english/advisories/2005/2036 Vdb Entry
http://www.vupen.com/english/advisories/2005/2659 Vdb Entry
http://www.vupen.com/english/advisories/2005/2710 Vdb Entry
http://www.vupen.com/english/advisories/2005/2908 Vdb Entry
http://www.vupen.com/english/advisories/2005/3002 Vdb Entry
http://www.vupen.com/english/advisories/2005/3056 Vdb Entry
http://www.vupen.com/english/advisories/2006/3531 Vdb Entry
http://www.vupen.com/english/advisories/2007/0326 Vdb Entry
http://www.vupen.com/english/advisories/2007/0343 Vdb Entry
http://www.vupen.com/english/advisories/2007/2457 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/35287 Vdb Entry
https://issues.rpath.com/browse/RPL-1633 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11454 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7
Search vendor "Openssl" for product "Openssl" and version "0.9.7"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7a
Search vendor "Openssl" for product "Openssl" and version "0.9.7a"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7b
Search vendor "Openssl" for product "Openssl" and version "0.9.7b"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7c
Search vendor "Openssl" for product "Openssl" and version "0.9.7c"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7d
Search vendor "Openssl" for product "Openssl" and version "0.9.7d"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7e
Search vendor "Openssl" for product "Openssl" and version "0.9.7e"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7f
Search vendor "Openssl" for product "Openssl" and version "0.9.7f"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.7g
Search vendor "Openssl" for product "Openssl" and version "0.9.7g"
-
Affected
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.8
Search vendor "Openssl" for product "Openssl" and version "0.9.8"
-
Affected