F5 Networks BIG-IP : MD2 Message-Digest Algorithm vulnerability (SOL15663)
Medium Nessus Plugin ID 78200
SynopsisThe remote device is missing a vendor-supplied security patch.
DescriptionThe Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k;
and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. CVE-2009-2409
SolutionUpgrade to one of the non-vulnerable versions listed in the F5 Solution SOL15663.