CWE
310
Advisory Published
CVE Published
Updated

CVE-2012-2143

First published: Fri Apr 27 2012(Updated: )

A security flaw was found in the way DES and extended DES based crypt() password encryption function performed encryption of certain keys, when the key to be encrypted was provided in the Unicode encoding (certain keys were truncated before being DES digested). When the resulting ciphertext for such a previously shortened key was used as a pattern in a password protected resource, intended to be matched against subsequently encrypted value of the password field, retrieved from the user authentication dialog, it could lead to authentication bypass.

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/postgresql<9.1.4
9.1.4
redhat/postgresql<9.0.8
9.0.8
redhat/postgresql<8.4.12
8.4.12
redhat/postgresql<8.3.19
8.3.19
PostgreSQL JDBC Driver>=8.3<8.3.19
PostgreSQL JDBC Driver>=8.4<8.4.12
PostgreSQL JDBC Driver>=9.0<9.0.8
PostgreSQL JDBC Driver>=9.1<9.1.4
FreeBSD FreeBSD<=9.0
FreeBSD FreeBSD=1.0
FreeBSD FreeBSD=1.1
FreeBSD FreeBSD=1.1.5
FreeBSD FreeBSD=1.1.5.1
FreeBSD FreeBSD=2.0
FreeBSD FreeBSD=2.0.5
FreeBSD FreeBSD=2.1
FreeBSD FreeBSD=2.1.5
FreeBSD FreeBSD=2.1.6
FreeBSD FreeBSD=2.1.7
FreeBSD FreeBSD=2.2
FreeBSD FreeBSD=2.2.1
FreeBSD FreeBSD=2.2.2
FreeBSD FreeBSD=2.2.5
FreeBSD FreeBSD=2.2.6
FreeBSD FreeBSD=2.2.7
FreeBSD FreeBSD=2.2.8
FreeBSD FreeBSD=3.0
FreeBSD FreeBSD=3.1
FreeBSD FreeBSD=3.2
FreeBSD FreeBSD=3.3
FreeBSD FreeBSD=3.4
FreeBSD FreeBSD=3.5
FreeBSD FreeBSD=4.0
FreeBSD FreeBSD=4.1
FreeBSD FreeBSD=4.1.1
FreeBSD FreeBSD=4.2
FreeBSD FreeBSD=4.3
FreeBSD FreeBSD=4.4
FreeBSD FreeBSD=4.5
FreeBSD FreeBSD=4.6
FreeBSD FreeBSD=4.6.2
FreeBSD FreeBSD=4.7
FreeBSD FreeBSD=4.8
FreeBSD FreeBSD=4.9
FreeBSD FreeBSD=4.10
FreeBSD FreeBSD=4.11
FreeBSD FreeBSD=5.0
FreeBSD FreeBSD=5.1
FreeBSD FreeBSD=5.2
FreeBSD FreeBSD=5.2.1
FreeBSD FreeBSD=5.3
FreeBSD FreeBSD=5.4
FreeBSD FreeBSD=5.5
FreeBSD FreeBSD=6.0
FreeBSD FreeBSD=6.1
FreeBSD FreeBSD=6.2
FreeBSD FreeBSD=6.3
FreeBSD FreeBSD=6.4
FreeBSD FreeBSD=7.0
FreeBSD FreeBSD=7.1
FreeBSD FreeBSD=7.2
FreeBSD FreeBSD=7.3
FreeBSD FreeBSD=7.4
FreeBSD FreeBSD=8.0
FreeBSD FreeBSD=8.1
FreeBSD FreeBSD=8.2
FreeBSD FreeBSD=8.3
PHP<5.3.14
PHP>=5.4.0<5.4.4
Debian GNU/Linux=6.0
PostgreSQL JDBC Driver=8.3
PostgreSQL JDBC Driver=8.4
PostgreSQL JDBC Driver=9.0
PostgreSQL JDBC Driver=9.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2012-2143?

    CVE-2012-2143 has been classified as a high-severity vulnerability due to its potential to expose sensitive password information.

  • How do I fix CVE-2012-2143?

    To fix CVE-2012-2143, upgrade to PostgreSQL version 9.1.4 or later, 9.0.8 or later, 8.4.12 or later, or 8.3.19 or later.

  • What software is affected by CVE-2012-2143?

    CVE-2012-2143 affects multiple versions of PostgreSQL and FreeBSD operating systems.

  • Can CVE-2012-2143 be exploited remotely?

    Yes, CVE-2012-2143 can potentially be exploited remotely if malicious actors have access to the password encryption function.

  • What impact does CVE-2012-2143 have on password security?

    CVE-2012-2143 can lead to the disclosure of passwords through improper encryption, thus compromising the security of user accounts.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203