The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
References
Configurations
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.sun.com/kah/entry/derby_10_6_1_has - | |
References | () http://db.apache.org/derby/releases/release-10.6.1.0.cgi#Fix+for+Security+Bug+CVE-2009-4269 - | |
References | () http://marc.info/?l=apache-db-general&m=127428514905504&w=1 - | |
References | () http://marcellmajor.com/derbyhash.html - | |
References | () http://secunia.com/advisories/42948 - | |
References | () http://secunia.com/advisories/42970 - | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html - | |
References | () http://www.securityfocus.com/bid/42637 - | |
References | () http://www.securitytracker.com/id?1024977 - | |
References | () http://www.vupen.com/english/advisories/2011/0149 - | |
References | () https://issues.apache.org/jira/browse/DERBY-4483 - Vendor Advisory |
Information
Published : 2010-08-16 20:00
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4269
Mitre link : CVE-2009-4269
CVE.ORG link : CVE-2009-4269
JSON object : View
Products Affected
apache
- derby
CWE
CWE-310
Cryptographic Issues