First published: Sat Feb 28 2015(Updated: )
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
jBCrypt | <0.4 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0886 has a moderate severity rating due to the potential for remote attackers to exploit the integer overflow vulnerability.
To fix CVE-2015-0886, upgrade jBCrypt to version 0.4 or later to eliminate the integer overflow issue.
CVE-2015-0886 affects jBCrypt versions prior to 0.4 and Fedora versions 20, 21, and 22.
The impact of CVE-2015-0886 allows remote attackers to perform brute-force attacks to determine cleartext password values.
CVE-2015-0886 was publicly disclosed in March 2015.