Poul-Henning Kamp md5crypt has insufficient algorithmic complexity and a consequently short runtime, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack, as demonstrated by an attack using GPU hardware.
References
Link | Resource |
---|---|
http://phk.freebsd.dk/sagas/md5crypt_eol.html | Vendor Advisory |
https://phk.freebsd.dk/sagas/md5crypt_eol/ | |
http://phk.freebsd.dk/sagas/md5crypt_eol.html | Vendor Advisory |
https://phk.freebsd.dk/sagas/md5crypt_eol/ |
Configurations
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://phk.freebsd.dk/sagas/md5crypt_eol.html - Vendor Advisory | |
References | () https://phk.freebsd.dk/sagas/md5crypt_eol/ - |
Information
Published : 2012-06-13 19:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3287
Mitre link : CVE-2012-3287
CVE.ORG link : CVE-2012-3287
JSON object : View
Products Affected
poul-henning_kamp
- md5crypt
CWE
CWE-310
Cryptographic Issues