First published: Mon Aug 16 2010(Updated: )
Apache Derby could allow a remote attacker to obtain sensitive information, caused by the reduction of the size of the set of inputs to SHA-1 by the password hash generation algorithm managed by the BUILTIN authentication functionality. By generating hash collisions, a remote attacker could exploit this vulnerability to crack passwords and obtain sensitive information.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Derby | <=10.5.3.0 | |
maven/org.apache.derby:derby | <=10.5.3.01 | 10.6.1.0 |
<=6.0.2 | ||
<=7.0 | ||
<=7.0.1 | ||
<=7.0.2 | ||
<=6.0.6.1 | ||
<=6.0.6 | ||
<=7.0.1 | ||
<=7.0.2 | ||
<=7.0 | ||
<=7.0.2 | ||
<=7.0.1 | ||
<=6.0.2 | ||
<=6.0.6.1 | ||
<=7.0 | ||
<=6.0.6 | ||
<=All | ||
<=7.0.2 | ||
<=6.0.6.1 | ||
<=7.0.1 | ||
<=6.0.6 | ||
<=7.0.0 | ||
<=6.0.2 | ||
<=All |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Apache Derby vulnerability is CVE-2009-4269.
CVE-2009-4269 has a severity rating of 2.1, which is considered low.
CVE-2009-4269 allows a remote attacker to obtain sensitive information through a reduction in the size of the input set of the password hash generation algorithm.
Apache Derby versions up to and including 10.5.3.0 are affected by CVE-2009-4269.
To fix CVE-2009-4269, it is recommended to update Apache Derby to version 10.6.1.0 or later.