Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-0886

Опубликовано: 27 фев. 2015
Источник: redhat
CVSS2: 2.6
EPSS Низкий

Описание

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Operations Network 3jbcryptNot affected
Red Hat OpenShift Enterprise 2jenkinsUnder investigation

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1197815jBCrypt: integer overflow in the crypt_raw method

EPSS

Процентиль: 85%
0.02478
Низкий

2.6 Low

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

nvd
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

debian
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching impleme ...

github
больше 3 лет назад

Integer Overflow or Wraparound in JBCrypt

EPSS

Процентиль: 85%
0.02478
Низкий

2.6 Low

CVSS2