Vulnerability Description
Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arkeia | Arkeia | 4.2 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.htmlBroken Link
- http://www.securityfocus.com/bid/3204Broken LinkPatchThird Party Advisory
- http://archives.neohapsis.com/archives/bugtraq/2001-08/0228.htmlBroken Link
- http://www.securityfocus.com/bid/3204Broken LinkPatchThird Party Advisory
FAQ
What is CVE-2001-0967?
CVE-2001-0967 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password gu...
How severe is CVE-2001-0967?
CVE-2001-0967 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2001-0967?
Check the references section above for vendor advisories and patch information. Affected products include: Arkeia Arkeia.