First published: Wed Apr 30 2014(Updated: )
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, uses the DES-based crypt function to hash passwords, which makes it easier for attackers to obtain sensitive information via a brute-force attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise MRG | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6445 has a moderate severity level due to its use of outdated DES-based password hashing.
To fix CVE-2013-6445, update to a version of the software that uses a stronger hashing algorithm for passwords.
CVE-2013-6445 allows attackers to potentially compromise sensitive information through brute-force attacks on hashed passwords.
CVE-2013-6445 is specific to Red Hat Enterprise MRG version 2.5 and may not be present in later versions with security improvements.
Any organization using Red Hat Enterprise MRG 2.5 is affected by CVE-2013-6445 due to its weak password hashing implementation.