The Debian php_crypt_revamped.patch patch for PHP 5.3.x, as used in the php5 package before 5.3.3-7+squeeze4 in Debian GNU/Linux squeeze, the php5 package before 5.3.2-1ubuntu4.17 in Ubuntu 10.04 LTS, and the php5 package before 5.3.5-1ubuntu7.10 in Ubuntu 11.04, does not properly handle an empty salt string, which might allow remote attackers to bypass authentication by leveraging an application that relies on the PHP crypt function to choose a salt for password hashing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581170 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/04/7 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/05/2 - | |
References | () http://www.ubuntu.com/usn/USN-1481-1 - |
Information
Published : 2012-08-07 19:55
Updated : 2024-11-21 01:38
NVD link : CVE-2012-2317
Mitre link : CVE-2012-2317
CVE.ORG link : CVE-2012-2317
JSON object : View
Products Affected
debian
- debian_linux
- php5-common
canonical
- php5
- ubuntu_linux
CWE
CWE-310
Cryptographic Issues