Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/3204 | patch vdb entry vendor advisory broken link third party advisory |
http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html | broken link mailing list |