CVE-2006-1058

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
Configurations

Configuration 1 (hide)

cpe:2.3:a:busybox:busybox:1.1.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:avaya:aura_application_enablement_services:4.01:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_application_enablement_services:4.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:aura_sip_enablement_services:*:*:*:*:*:*:*:*
cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-04-04 10:04

Updated : 2024-02-09 03:05


NVD link : CVE-2006-1058

Mitre link : CVE-2006-1058

CVE.ORG link : CVE-2006-1058


JSON object : View

Products Affected

avaya

  • messaging_storage_server
  • aura_sip_enablement_services
  • message_networking
  • aura_application_enablement_services

busybox

  • busybox
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort