CVE-2012-2143
Severity CVSS v4.0:
Pending analysis
Type:
CWE-310
Cryptographic Issues
Publication date:
05/07/2012
Last modified:
14/03/2024
Description
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 8.3 (including) | 8.3.19 (excluding) |
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 8.4 (including) | 8.4.12 (excluding) |
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 9.0 (including) | 9.0.8 (excluding) |
cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:* | 9.1 (including) | 9.1.4 (excluding) |
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* | 9.0 (including) | |
cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.php.net/?p=php-src.git%3Ba%3Dcommit%3Bh%3Daab49e934de1fff046e659cbec46e3d053b41c34
- http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e8333852e370c7a6dad75d9f236f9
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.html
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2012-1037.html
- http://secunia.com/advisories/49304
- http://secunia.com/advisories/50718
- http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.asc
- http://support.apple.com/kb/HT5501
- http://www.debian.org/security/2012/dsa-2491
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A092
- http://www.postgresql.org/docs/8.3/static/release-8-3-19.html
- http://www.postgresql.org/docs/8.4/static/release-8-4-12.html
- http://www.postgresql.org/docs/9.0/static/release-9-0-8.html
- http://www.postgresql.org/docs/9.1/static/release-9-1-4.html
- http://www.postgresql.org/support/security/
- http://www.securitytracker.com/id?1026995=
- https://bugzilla.redhat.com/show_bug.cgi?id=816956