CVE-2015-0886: Integer Overflow or Wraparound
(updated )
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
References
- jvn.jp/en/jp/JVN77718330/index.html
- jvndb.jvn.jp/jvndb/JVNDB-2015-000033
- lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html
- lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html
- lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html
- www.mindrot.org/projects/jBCrypt/news/rel04.html
- bugzilla.mindrot.org/show_bug.cgi?id=2097
- github.com/advisories/GHSA-9h6p-92jq-888x
- lists.apache.org/thread.html/rbd23e3ac8113b4da0a025c0e45170b6ec317383a1cf06090c2c717aa@%3Ccommits.cassandra.apache.org%3E
- lists.apache.org/thread.html/rd5c2256b8dc9935e4bb5e9be90adce58408054bb42523730a40c5548@%3Ccommits.cassandra.apache.org%3E
- lists.apache.org/thread.html/re330cfe9e5d84e3f7da8ace23ec32f38cb3fbd328bf177badd7ad942@%3Ccommits.cassandra.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2015-0886
Detect and mitigate CVE-2015-0886 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →