My security scan on a Netware 6.5 server is showing another vulnerability.

A vulnerability exists in X.509 certificates which, when signed using message-digest algorithms that allow collisions, may allow for
phishing attacks.
Recommendation:
McAfee is not aware of a vendor-supplied vendor patch or update at this time.
Workaround:
Utilize an alternative hashing method to sign certificates (ex: SHA-256, SHA-512)
Observation:
A vulnerability exists in X.509 certificates which, when signed using message-digest algorithms that allow collisions, may allow for
phishing attacks.
The flaw is specific to weaknesses in the MD5 algorithm used to sign X.509 certificates. It is possible for a potential attacker to
generate multiple pairs of certificates, which share like MD5 signatures. Typical exploration would allow the attacker to impersonate
a legitimate website.
The MD2 algorithm is also known to allow collisions, and presents the same vulnerability.

It looks like OpenWBEM is causing the issue. Is there a way in Novell to use an alternative hashing method to sign certificates?

If I turn off OpenWBEM, what are the implications? I only use Novell Remote Manager. No other web based service such as Imanager is installed. Thanks for any help.