Rapid7 Vulnerability & Exploit Database

FreeBSD: FreeBSD -- Incorrect crypt() hashing (FreeBSD-SA-12:02.crypt) (CVE-2012-2143)

Back to Search

FreeBSD: FreeBSD -- Incorrect crypt() hashing (FreeBSD-SA-12:02.crypt) (CVE-2012-2143)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
07/05/2012
Created
07/25/2018
Added
05/08/2014
Modified
02/21/2017

Description

The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

Solution(s)

  • freebsd-upgrade-base-7_4-release-p8
  • freebsd-upgrade-base-8_1-release-p10
  • freebsd-upgrade-base-8_2-release-p8
  • freebsd-upgrade-base-8_3-release-p2
  • freebsd-upgrade-base-9_0-release-p2

References

  • freebsd-upgrade-base-7_4-release-p8
  • freebsd-upgrade-base-8_1-release-p10
  • freebsd-upgrade-base-8_2-release-p8
  • freebsd-upgrade-base-8_3-release-p2
  • freebsd-upgrade-base-9_0-release-p2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;