The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.
2009-07-30T19:30:00.343
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.1 (MEDIUM)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | gnutls | < 2.6.4 | Yes |
Application | gnu | gnutls | < 2.7.4 | Yes |
Application | mozilla | network_security_services | < 3.12.3 | Yes |
Application | openssl | openssl | ≤ 0.9.8k | Yes |