BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Link | Tags |
---|---|
http://secunia.com/advisories/25098 | third party advisory broken link |
http://www.securityfocus.com/bid/17330 | vdb entry third party advisory broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9483 | vdb entry signature broken link |
http://secunia.com/advisories/19477 | broken link third party advisory vendor advisory |
http://bugs.busybox.net/view.php?id=604 | broken link |
http://secunia.com/advisories/25848 | third party advisory broken link |
http://support.avaya.com/elmodocs2/security/ASA-2007-250.htm | third party advisory |
http://www.redhat.com/support/errata/RHSA-2007-0244.html | vendor advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25569 | vdb entry third party advisory |