The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2013/03/26/2 | third party advisory mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html | third party advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html | third party advisory tool signature |
http://www.securityfocus.com/bid/58702 | third party advisory vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83039 | third party advisory vdb entry |