// For flags

CVE-2012-2317

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Debian php_crypt_revamped.patch patch for PHP 5.3.x, as used in the php5 package before 5.3.3-7+squeeze4 in Debian GNU/Linux squeeze, the php5 package before 5.3.2-1ubuntu4.17 in Ubuntu 10.04 LTS, and the php5 package before 5.3.5-1ubuntu7.10 in Ubuntu 11.04, does not properly handle an empty salt string, which might allow remote attackers to bypass authentication by leveraging an application that relies on the PHP crypt function to choose a salt for password hashing.

El parche de Debian php_crypt_revamped.patch para PHP v5.3.x, como el usado en el paquete php5 anterior a v5.3.3-7+squeeze4 en Debian GNU/Linux squeeze, el paquete php5 anterior a v5.3.2-1ubuntu4.17 en Ubuntu 10.04 LTS, y el paquete php5 anterior a v5.3.5-1ubuntu7.10 en Ubuntu 11.04, no gestiona de forma adecuada una cadena de salto vacía, lo que podría permitir a atacantes remotos evitar la autenticación mediante el aprovechamiento de una aplicación que se basa en la función crypt de PHP para elegir el salto en el proceso de obtención del hash de una contraseña.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-04-19 CVE Reserved
  • 2012-06-20 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Debian
Search vendor "Debian"
Php5-common
Search vendor "Debian" for product "Php5-common"
<= 5.3.2-1
Search vendor "Debian" for product "Php5-common" and version " <= 5.3.2-1"
-
Affected
Debian
Search vendor "Debian"
Php5-common
Search vendor "Debian" for product "Php5-common"
5.3.3-7\+squeeze4
Search vendor "Debian" for product "Php5-common" and version "5.3.3-7\+squeeze4"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
*-
Affected
Canonical
Search vendor "Canonical"
Php5
Search vendor "Canonical" for product "Php5"
<= 5.3.2-1ubuntu4.16
Search vendor "Canonical" for product "Php5" and version " <= 5.3.2-1ubuntu4.16"
-
Affected
Canonical
Search vendor "Canonical"
Php5
Search vendor "Canonical" for product "Php5"
5.3.2-1ubuntu4.17
Search vendor "Canonical" for product "Php5" and version "5.3.2-1ubuntu4.17"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
10.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04"
lts
Affected
Canonical
Search vendor "Canonical"
Php5
Search vendor "Canonical" for product "Php5"
<= 5.3.5-1ubuntu7.9
Search vendor "Canonical" for product "Php5" and version " <= 5.3.5-1ubuntu7.9"
-
Affected
Canonical
Search vendor "Canonical"
Php5
Search vendor "Canonical" for product "Php5"
5.3.5-1ubuntu7.10
Search vendor "Canonical" for product "Php5" and version "5.3.5-1ubuntu7.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
11.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04"
-
Affected