BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
References
Link | Resource |
---|---|
http://bugs.busybox.net/view.php?id=604 | Broken Link |
http://secunia.com/advisories/19477 | Broken Link Vendor Advisory |
http://secunia.com/advisories/25098 | Broken Link |
http://secunia.com/advisories/25848 | Broken Link |
http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm | Third Party Advisory |
http://www.redhat.com/support/errata/RHSA-2007-0244.html | Broken Link |
http://www.securityfocus.com/bid/17330 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25569 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483 | Broken Link |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2006-04-04T10:00:00
Updated: 2017-10-10T00:57:01
Reserved: 2006-03-07T00:00:00
Link: CVE-2006-1058
JSON object: View
NVD Information
Status : Analyzed
Published: 2006-04-04T10:04:00.000
Modified: 2024-02-09T03:05:29.307
Link: CVE-2006-1058
JSON object: View
Redhat Information
No data.
CWE