BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
References
Link | Resource |
---|---|
http://bugs.busybox.net/view.php?id=604 | Broken Link |
http://secunia.com/advisories/19477 | Broken Link Vendor Advisory |
http://secunia.com/advisories/25098 | Broken Link |
http://secunia.com/advisories/25848 | Broken Link |
http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2007-0244.html | Broken Link |
http://www.securityfocus.com/bid/17330 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25569 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483 | Broken Link |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2006-04-04 10:04
Updated : 2024-02-09 03:05
NVD link : CVE-2006-1058
Mitre link : CVE-2006-1058
CVE.ORG link : CVE-2006-1058
JSON object : View
Products Affected
avaya
- messaging_storage_server
- aura_sip_enablement_services
- message_networking
- aura_application_enablement_services
busybox
- busybox
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort