The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
References
Link Resource
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aab49e934de1fff046e659cbec46e3d053b41c34 Broken Link Patch
http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9 Vendor Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 Third Party Advisory
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1037.html Third Party Advisory
http://secunia.com/advisories/49304 Broken Link Vendor Advisory
http://secunia.com/advisories/50718 Broken Link Vendor Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc Vendor Advisory
http://support.apple.com/kb/HT5501 Third Party Advisory
http://www.debian.org/security/2012/dsa-2491 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2012:092 Broken Link
http://www.postgresql.org/docs/8.3/static/release-8-3-19.html Vendor Advisory
http://www.postgresql.org/docs/8.4/static/release-8-4-12.html Vendor Advisory
http://www.postgresql.org/docs/9.0/static/release-9-0-8.html Vendor Advisory
http://www.postgresql.org/docs/9.1/static/release-9-1-4.html Vendor Advisory
http://www.postgresql.org/support/security/ Vendor Advisory
http://www.securitytracker.com/id?1026995 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=816956 Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2012-07-05T14:00:00

Updated: 2016-12-06T18:57:01

Reserved: 2012-04-04T00:00:00


Link: CVE-2012-2143

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2012-07-05T14:55:02.183

Modified: 2024-03-14T19:59:00.810


Link: CVE-2012-2143

JSON object: View

cve-icon Redhat Information

No data.

CWE