Lucene search

K
f5F5F5:K15663
HistoryOct 23, 2014 - 12:00 a.m.

K15663 : MD2 Message-Digest Algorithm vulnerability CVE-2009-2409

2014-10-2300:00:00
my.f5.com
33

7.5 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.3%

Security Advisory Description

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. (CVE-2009-2409)
Impact
None. No F5 products are affected by this vulnerability.
Note: F5 Product Development has determined that BIG-IP, BIG-IQ, and Enterprise Manager versions ship with vulnerable GnuTLS code. However, the vulnerable code is not used as a server or to make outgoing connections, and is not exploitable.