Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 does not use a random password salt in config.php, which makes it easier for attackers to conduct brute-force password guessing attacks.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
http://moodle.org/mod/forum/discuss.php?d=139111 | patch vendor advisory |
http://docs.moodle.org/en/Moodle_1.9.7_release_notes | patch |
http://docs.moodle.org/en/Moodle_1.8.11_release_notes | patch |
http://www.vupen.com/english/advisories/2009/3455 | vdb entry patch vendor advisory |
http://secunia.com/advisories/37614 | third party advisory vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00751.html | vendor advisory |
http://www.securityfocus.com/bid/37244 | vdb entry patch |