PostgreSQL uses the username for a salt when generating passwords, which makes it easier for remote attackers to guess passwords via a brute force attack.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/20215 | vdb entry broken link |
http://marc.info/?l=bugtraq&m=111402558115859&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=111403050902165&w=2 | mailing list |
http://archives.postgresql.org/pgsql-admin/2002-08/msg00253.php | mailing list |