ID

VAR-E-200412-0151


CVE

cve_id:CVE-2004-2761

Trust: 1.9

sources: BID: 33065 // EXPLOIT-DB: 24807 // EDBNET: 46885

EDB ID

24807


TITLE

MD5 - Message Digest Algorithm Hash Collision - Multiple dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 24807

DESCRIPTION

MD5 - Message Digest Algorithm Hash Collision. CVE-2004-2761CVE-45127 . dos exploit for Multiple platform

Trust: 0.6

sources: EXPLOIT-DB: 24807

AFFECTED PRODUCTS

vendor:md5model: - scope: - version: -

Trust: 1.0

vendor:yamahamodel:srt100scope:eqversion:0

Trust: 0.3

vendor:yamahamodel:rtx3000scope:eqversion:0

Trust: 0.3

vendor:yamahamodel:rtx2000scope:eqversion:0

Trust: 0.3

vendor:yamahamodel:rtx1500scope: - version: -

Trust: 0.3

vendor:yamahamodel:rtx1100scope: - version: -

Trust: 0.3

vendor:yamahamodel:rtx1000scope: - version: -

Trust: 0.3

vendor:yamahamodel:rtv700scope: - version: -

Trust: 0.3

vendor:yamahamodel:rt300iscope: - version: -

Trust: 0.3

vendor:yamahamodel:rt107escope:eqversion:0

Trust: 0.3

vendor:yamahamodel:rt105scope: - version: -

Trust: 0.3

vendor:yamahamodel:rt104scope:eqversion:0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:7.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:redhatmodel:certificate serverscope:eqversion:7.3

Trust: 0.3

vendor:oraclemodel:trace file analyzerscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11.3

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.12

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:ietfmodel:rfc algorithms and identifiers for the interscope:eqversion:3279:0

Trust: 0.3

vendor:hpmodel:vsr (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:u200s and cs (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:u200a and m (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:smb1920 (comware r1106scope:eqversion:5)

Trust: 0.3

vendor:hpmodel:smb1910 (comware r1108scope:eqversion:5)

Trust: 0.3

vendor:hpmodel:smb (comware r1105scope:eqversion:16205)

Trust: 0.3

vendor:hpmodel:secblade fw (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:msr4000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr3000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr2000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr20-1x (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:msr20 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:msr1000 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:msr (comwarescope:eqversion:9xx5)0

Trust: 0.3

vendor:hpmodel:msr (comwarescope:eqversion:93x5)0

Trust: 0.3

vendor:hpmodel:msr 50-g2 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:msr (comwarescope:eqversion:30-1x5)0

Trust: 0.3

vendor:hpmodel:msr (comwarescope:eqversion:30-165)0

Trust: 0.3

vendor:hpmodel:msr (comwarescope:eqversion:305)0

Trust: 0.3

vendor:hpmodel:moonshotscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg768aae hp pcm+ to imc std upg w/ 200-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg767aae hp imc smcnct wsm vrtl applnc sw e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg766aae hp imc smcnct vrtl applnc sw e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg748aae hp imc ent sw plat w/ nodes e-ltuscope:eqversion:500

Trust: 0.3

vendor:hpmodel:jg747aae hp imc std sw plat w/ nodes e-ltuscope:eqversion:500

Trust: 0.3

vendor:hpmodel:jg660aae hp imc smart connect w/wlm vae e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg590aae hp imc bsc wlan mgr sw pltfm ap e-ltuscope:eqversion:500

Trust: 0.3

vendor:hpmodel:jg550aae hp pmm to imc bsc wlm upgr w/150ap e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg549aae hp pcm+ to imc std upgr w/200-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg548aae hp pcm+ to imc bsc upgr w/50-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jg546aae hp imc basic sw platform w/50-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf378aae hp imc ent s/w pltfrm w/200-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf378a hp imc ent s/w platform w/200-node licscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf377aae hp imc std s/w pltfrm w/100-node e-ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf377a hp imc std s/w platform w/100-node licscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf289aae hp enterprise management system to intelligent managemescope:eqversion:0

Trust: 0.3

vendor:hpmodel:jf288aae hp network director to intelligent management centerscope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd816a hp a-imc standard edition software dvd mediascope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd815a hp imc std platform w/100-node licensescope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd814a hp a-imc enterprise edition software dvd mediascope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd808a hp imc ent platform w/100-node licensescope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd126a hp imc ent s/w platform w/100-nodescope:eqversion:0

Trust: 0.3

vendor:hpmodel:jd125a hp imc std s/w platform w/100-nodescope:eqversion:0

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:7)0

Trust: 0.3

vendor:hpmodel:hsr6800 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:hsr6602 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:hp870 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:hp850 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:hp830 (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:f5000-c/s (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:f1000-e (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:f1000-a-ei (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:9500e (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:(comware r2122scope:eqversion:79007)

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75007)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:75005)0

Trust: 0.3

vendor:hpmodel:rse ru r3303p18scope:eqversion:66005

Trust: 0.3

vendor:hpmodel:6127xlgscope:eqversion:0

Trust: 0.3

vendor:hpmodel:6125xlgscope:eqversion:0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59507)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59407)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59307)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59207)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:59007)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:58305)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:58005)0

Trust: 0.3

vendor:hpmodel:5500si (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:hi (comwarescope:eqversion:55005)0

Trust: 0.3

vendor:hpmodel:ei (comwarescope:eqversion:55005)0

Trust: 0.3

vendor:hpmodel:(comware r3108p03scope:eqversion:51307)

Trust: 0.3

vendor:hpmodel:si (comwarescope:eqversion:51205)0

Trust: 0.3

vendor:hpmodel:ei (comwarescope:eqversion:51205)0

Trust: 0.3

vendor:hpmodel:4800g (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:4500g (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:4210g (comwarescope:eqversion:5)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125007)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:125005)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105007)0

Trust: 0.3

vendor:hpmodel:(comwarescope:eqversion:105005)0

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.4

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.3

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.2

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.1.1

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.1

Trust: 0.3

vendor:f5model:arxscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ios cascope:eqversion:0

Trust: 0.3

vendor:oraclemodel:trace file analyzerscope:neversion:12.1.2.8.4

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.12.2

Trust: 0.3

vendor:ronaldmodel:l. rivest md5 algorithmscope: - version: -

Trust: 0.3

sources: BID: 33065 // BID: 11849 // EXPLOIT-DB: 24807

EXPLOIT

source: https://www.securityfocus.com/bid/11849/info

The MD5 algorithm is reported prone to a hash collision weakness. This weakness reportedly allows attackers to create multiple, differing input sources that, when the MD5 algorithm is used, result in the same output fingerprint.

It has been demonstrated that attackers can create multiple input sources to MD5 that result in the same output fingerprint. Reportedly, at this time, attackers cannot generate arbitrary collisions. At this time, it is also reported that only a very limited number of individual bits in an input message may be altered while maintaining an identical output fingerprint.

This weakness may allow attackers to create two messages, or executable binaries such that their MD5 fingerprints are identical. One of these messages or binaries would be innocent, and the other malicious. The innocent message or binary may be digitally signed, and then later would have the malicious file substituted into its place. This attack may allow malicious code to be executed, or non-repudiation properties of messages to be broken.

At this time, preimage attacks are not reportedly possible.

It is recommended that cryptosystems that utilize the MD5 algorithm should be reviewed, and the measures should be taken to protect against this weakness. Other hashing algorithms may possibly be utilized in replacement to, or in conjunction with MD5 to decrease the likelihood of a successful attack.

https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24807.tar.gz

Trust: 1.0

sources: EXPLOIT-DB: 24807

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 24807

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 24807

TYPE

Message Digest Algorithm Hash Collision

Trust: 1.0

sources: EXPLOIT-DB: 24807

CREDITS

Dan Kaminsky

Trust: 0.6

sources: EXPLOIT-DB: 24807

EXTERNAL IDS

db:NVDid:CVE-2004-2761

Trust: 1.9

db:EXPLOIT-DBid:24807

Trust: 1.9

db:BIDid:11849

Trust: 1.9

db:EDBNETid:46885

Trust: 0.6

db:CERT/CCid:VU#836068

Trust: 0.3

db:BIDid:33065

Trust: 0.3

sources: BID: 33065 // BID: 11849 // EXPLOIT-DB: 24807 // EDBNET: 46885

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2004-2761

Trust: 1.6

url:https://www.securityfocus.com/bid/11849/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/24807/

Trust: 0.6

url:http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx

Trust: 0.3

url:http://tools.cisco.com/security/center/viewalert.x?alertid=17341

Trust: 0.3

url:http://www.phreedom.org/research/rogue-ca/

Trust: 0.3

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Trust: 0.3

url:http://www.microsoft.com/technet/security/advisory/961509.mspx

Trust: 0.3

url:http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/

Trust: 0.3

url:http://tools.ietf.org/html/rfc3279

Trust: 0.3

url:http://www.trustcenter.de/media/tc_response_to_md5_vulnerability_paper.pdf

Trust: 0.3

url:http://www.win.tue.nl/hashclash/rogue-ca/

Trust: 0.3

url:http://www.mozilla.org/projects/security/pki/nss/

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/836068

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05336888

Trust: 0.3

url:http://www.rtpro.yamaha.co.jp/rt/faq/security/vu836068.html

Trust: 0.3

url:http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15578.html?ref=rss

Trust: 0.3

url:http://www.entrust.net/knowledge-base/technote.cfm?tn=7690

Trust: 0.3

url:https://blogs.verisign.com/ssl-blog/2008/12/on_md5_vulnerabilities_and_mit.php

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_response09186a0080a5d24a.html

Trust: 0.3

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05289935

Trust: 0.3

url:http://www.cryptography.com/cnews/hash.html

Trust: 0.3

url:http://www.doxpara.com/md5_someday.pdf

Trust: 0.3

url:http://www.cs.ucsd.edu/users/bsy/dobbertin.ps

Trust: 0.3

url:https://www.exploit-db.com/exploits/24807

Trust: 0.3

url:http://www.ietf.org/rfc/rfc1321.txt

Trust: 0.3

url:http://theory.lcs.mit.edu/~rivest/homepage.html

Trust: 0.3

url:http://cryptography.hyperlink.cz/2004/collisions.htm

Trust: 0.3

url:http://eprint.iacr.org/2004/199.pdf

Trust: 0.3

sources: BID: 33065 // BID: 11849 // EXPLOIT-DB: 24807 // EDBNET: 46885

SOURCES

db:BIDid:33065
db:BIDid:11849
db:EXPLOIT-DBid:24807
db:EDBNETid:46885

LAST UPDATE DATE

2022-07-27T09:41:50.507000+00:00


SOURCES UPDATE DATE

db:BIDid:33065date:2017-05-02T03:05:00
db:BIDid:11849date:2004-12-07T00:00:00

SOURCES RELEASE DATE

db:BIDid:33065date:2008-12-30T00:00:00
db:BIDid:11849date:2004-12-07T00:00:00
db:EXPLOIT-DBid:24807date:2004-12-07T00:00:00
db:EDBNETid:46885date:2004-12-07T00:00:00