CVE-2006-0591

Published Feb 8, 2006

Last updated 6 years ago

Overview

Description
The crypt_gensalt functions for BSDI-style extended DES-based and FreeBSD-sytle MD5-based password hashes in crypt_blowfish 0.4.7 and earlier do not evenly and randomly distribute salts, which makes it easier for attackers to guess passwords from a stolen password file due to the increased number of collisions.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
1.2
Impact score
2.9
Exploitability score
1.9
Vector string
AV:L/AC:H/Au:N/C:P/I:N/A:N

Weaknesses

nvd@nist.gov
CWE-310

Evaluator

Comment
This vulnerability may only be exploited in conjunction with another vulnerability. The password file (normally shadowed) must first be stolen.
Impact
-
Solution
-

Configurations