CVE-2001-0967

Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html Broken Link
http://www.securityfocus.com/bid/3204 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arkeia:arkeia:4.2:*:*:*:*:*:*:*
cpe:2.3:a:arkeia:arkeia:4.2.8-2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2001-08-31 04:00

Updated : 2024-02-14 16:55


NVD link : CVE-2001-0967

Mitre link : CVE-2001-0967

CVE.ORG link : CVE-2001-0967


JSON object : View

Products Affected

arkeia

  • arkeia
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort