First published: Tue Apr 04 2006(Updated: )
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Busybox Busybox | =1.1.1 | |
Avaya Aura Application Enablement Services | =4.01 | |
Avaya Aura Application Enablement Services | =4.1 | |
Avaya Aura SIP Enablement Services | <5.0 | |
Avaya Message Networking | ||
Avaya Messaging Storage Server | >=3.0<4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1058 is considered a high severity vulnerability due to the lack of password salting, making it easier for attackers to exploit stolen password files.
To fix CVE-2006-1058, upgrade to a version of BusyBox that includes salt in password generation or implement an external solution that mitigates password cracking.
CVE-2006-1058 affects systems running BusyBox version 1.1.1 and certain Avaya products that utilize BusyBox for password management.
The risks associated with CVE-2006-1058 include unauthorized access to systems and data as attackers can easily crack unsalted passwords.
To mitigate the impact of CVE-2006-1058, consider using stronger password policies, multi-factor authentication, and regularly auditing password strength.