Описание
The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | ignored | end of life |
| lucid | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| precise/esm | DNE | |
| quantal | DNE | |
| raring | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 3.8.7-1ubuntu2.3 |
| natty | ignored | end of life |
| oneiric | released | 3.8.10-1ubuntu0.1 |
| precise | released | 3.8.11-1ubuntu0.1 |
| precise/esm | DNE | precise was released [3.8.11-1ubuntu0.1] |
| quantal | DNE | |
| raring | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 4.0.6-1 |
| esm-apps/xenial | not-affected | 4.0.6-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [4.0.6-1]] |
| hardy | DNE | |
| lucid | DNE | |
| natty | DNE | |
| oneiric | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needs-triage |
| quantal | not-affected | 4.0.6-1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.
The vulnerable-passwords script in Best Practical Solutions RT 3.x bef ...
The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.
EPSS
5 Medium
CVSS2