ID CVE-2009-4269
Summary The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution. Per https://issues.apache.org/jira/browse/DERBY-4483, the reported version affected is 10.5.3.0. Unable to determine if affected versions exist between 10.5.3.0 and 10.6.1.0
References
Vulnerable Configurations
  • cpe:2.3:a:apache:derby:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.3.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.3.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.3.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.4.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.4.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.5.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.5.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:derby:10.5.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:derby:10.5.3.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 26-01-2011 - 06:41)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 42637
confirm
misc
mlist [apache-db-general] 20100519 [ANNOUNCE] Apache Derby 10.6.1.0 released
sectrack 1024977
secunia
  • 42948
  • 42970
vupen ADV-2011-0149
Last major update 26-01-2011 - 06:41
Published 16-08-2010 - 20:00
Last modified 26-01-2011 - 06:41
Back to Top