Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0886

Опубликовано: 28 фев. 2015
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 5

Описание

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

0.4-2
cosmic

not-affected

0.4-2
devel

not-affected

0.4-2
disco

not-affected

0.4-2
esm-apps/bionic

not-affected

0.4-2
esm-apps/xenial

not-affected

0.4-2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

ignored

end of life

Показывать по

EPSS

Процентиль: 85%
0.02478
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

nvd
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

debian
почти 11 лет назад

Integer overflow in the crypt_raw method in the key-stretching impleme ...

github
больше 3 лет назад

Integer Overflow or Wraparound in JBCrypt

EPSS

Процентиль: 85%
0.02478
Низкий

5 Medium

CVSS2