First published: Fri Dec 31 2004(Updated: )
Off-by-one error in passwd 0.68 and earlier, when using the --stdin option, causes passwd to use the first 78 characters of a password instead of the first 79, which results in a small reduction of the search space required for brute force attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
Mandrake Linux | =8.2 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.2 | |
Mandrake Linux | =9.0 | |
Mandrake Linux | =8.2 | |
Mandrake Linux | =9.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =9.1 | |
Mandriva Linux Corporate Server | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2394 has a low severity due to the minimal reduction in brute force search space.
To fix CVE-2004-2394, upgrade to a version of the passwd utility that is not affected, preferably beyond version 0.68.
CVE-2004-2394 affects several distributions of Mandrake Linux and Mandriva Linux, including versions 8.2, 9.0, 9.1, 9.2, and 10.0.
The impact of CVE-2004-2394 is primarily a slight increase in vulnerability to brute force password attacks due to an off-by-one error.
CVE-2004-2394 is considered outdated and primarily affects legacy systems that still use the vulnerable versions of passwd.