Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-0886

Опубликовано: 28 фев. 2015
Источник: debian

Описание

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libjbcrypt-javafixed0.4-1package
libjbcrypt-javano-dsajessiepackage
libjbcrypt-javano-dsawheezypackage
libjbcrypt-javano-dsasqueezepackage

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

redhat
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

nvd
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

github
больше 3 лет назад

Integer Overflow or Wraparound in JBCrypt