Описание
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 0.4-2 |
| cosmic | not-affected | 0.4-2 |
| devel | not-affected | 0.4-2 |
| disco | not-affected | 0.4-2 |
| esm-apps/bionic | not-affected | 0.4-2 |
| esm-apps/xenial | not-affected | 0.4-2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | DNE | |
| precise | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
Integer overflow in the crypt_raw method in the key-stretching impleme ...
EPSS
5 Medium
CVSS2