First published: Tue Jul 22 2008(Updated: )
libxcrypt in SUSE openSUSE 11.0 uses the DES algorithm when the configuration specifies the MD5 algorithm, which makes it easier for attackers to conduct brute-force attacks against hashed passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3188 is considered a medium severity vulnerability due to its potential for enabling brute-force attacks on hashed passwords.
To fix CVE-2008-3188, update to a patched version of libxcrypt that does not incorrectly use the DES algorithm.
CVE-2008-3188 specifically affects openSUSE version 11.0.
Not fixing CVE-2008-3188 could lead to compromised user accounts due to easier brute-force attacks against hashed passwords.
There are no official workarounds for CVE-2008-3188; upgrading to a secure version is the recommended solution.