ID CVE-2006-1058
Summary BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
References
Vulnerable Configurations
  • cpe:2.3:a:busybox:busybox:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:busybox:busybox:1.1.1:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 11-10-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
oval via4
accepted 2013-04-29T04:19:41.563-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
family unix
id oval:org.mitre.oval:def:9483
status accepted
submitted 2010-07-09T03:56:16-04:00
title BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
version 23
redhat via4
advisories
bugzilla
id 187385
title CVE-2006-1058 BusyBox passwd command fails to generate password with salt
oval
AND
  • comment Red Hat Enterprise Linux 4 is installed
    oval oval:com.redhat.rhba:tst:20070304001
  • OR
    • AND
      • comment busybox is earlier than 0:1.00.rc1-7.el4
        oval oval:com.redhat.rhsa:tst:20070244002
      • comment busybox is signed with Red Hat master key
        oval oval:com.redhat.rhsa:tst:20070244003
    • AND
      • comment busybox-anaconda is earlier than 0:1.00.rc1-7.el4
        oval oval:com.redhat.rhsa:tst:20070244004
      • comment busybox-anaconda is signed with Red Hat master key
        oval oval:com.redhat.rhsa:tst:20070244005
rhsa
id RHSA-2007:0244
released 2007-05-01
severity Low
title RHSA-2007:0244: busybox security update (Low)
rpms
  • busybox-0:1.00.rc1-7.el4
  • busybox-anaconda-0:1.00.rc1-7.el4
refmap via4
bid 17330
confirm
secunia
  • 19477
  • 25098
  • 25848
xf busybox-passwd-weak-security(25569)
statements via4
contributor Mark J Cox
lastmodified 2006-09-19
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
Last major update 11-10-2017 - 01:30
Published 04-04-2006 - 10:04
Back to Top