The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords.
The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2014-0083 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0083 | issue tracking third party advisory patch |
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2014-0083 | issue tracking third party advisory |
https://github.com/ruby-ldap/ruby-net-ldap/commit/b412ca05f6b430eaa1ce97ac95885b4cf187b04a | patch |