First published: Thu May 08 2014(Updated: )
Foreman before 1.1 uses a salt of "foreman" to hash root passwords, which makes it easier for attackers to guess the password via a brute force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foreman | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0173 is considered a medium severity vulnerability due to its potential for brute force attacks against root passwords.
To fix CVE-2013-0173, upgrade to Foreman version 1.1 or later, which improves password hashing mechanisms.
Versions of Foreman prior to 1.1, specifically all versions up to and including 1.0, are affected by CVE-2013-0173.
CVE-2013-0173 facilitates brute force attacks, making it easier for attackers to guess root passwords.
There are no specific workarounds for CVE-2013-0173; the recommended action is to upgrade to a fixed version.