Описание
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.6 (включая)Версия до 0.6 (включая)
Одно из
cpe:2.3:a:sha256crypt_project:sha256crypt:*:*:*:*:*:*:*:*
cpe:2.3:a:sha512crypt_project:sha512crypt:*:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00307
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-770
Связанные уязвимости
CVSS3: 7.5
ubuntu
почти 4 года назад
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
CVSS3: 7.5
debian
почти 4 года назад
sha256crypt and sha512crypt through 0.6 allow attackers to cause a den ...
github
почти 4 года назад
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
EPSS
Процентиль: 53%
0.00307
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-770