CVE-2001-0967

Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html Broken Link
http://www.securityfocus.com/bid/3204 Broken Link Patch Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:arkeia:arkeia:4.2:*:*:*:*:*:*:*
cpe:2.3:a:arkeia:arkeia:4.2.8-2:*:*:*:*:*:*:*

History

14 Feb 2024, 16:55

Type Values Removed Values Added
CPE cpe:2.3:a:knox_software:arkeia:4.2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:knox_software:arkeia:4.2:*:*:*:*:*:*:*
cpe:2.3:a:arkeia:arkeia:4.2:*:*:*:*:*:*:*
cpe:2.3:a:arkeia:arkeia:4.2.8-2:*:*:*:*:*:*:*
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE NVD-CWE-Other CWE-916
References () http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html - () http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.html - Broken Link
References () http://www.securityfocus.com/bid/3204 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/3204 - Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
First Time Arkeia
Arkeia arkeia

Information

Published : 2001-08-31 04:00

Updated : 2024-02-14 16:55


NVD link : CVE-2001-0967

Mitre link : CVE-2001-0967

CVE.ORG link : CVE-2001-0967


JSON object : View

Products Affected

arkeia

  • arkeia
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort