Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-1058

Опубликовано: 19 дек. 2005
Источник: redhat
EPSS Низкий

Описание

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

Отчет

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.

Дополнительная информация

EPSS

Процентиль: 14%
0.00045
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 19 лет назад

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

CVSS3: 5.5
nvd
больше 19 лет назад

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

CVSS3: 5.5
debian
больше 19 лет назад

BusyBox 1.1.1 does not use a salt when generating passwords, which mak ...

CVSS3: 5.5
github
больше 3 лет назад

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

EPSS

Процентиль: 14%
0.00045
Низкий