Vulnerability Description
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Postgresql | Postgresql | >= 8.3, < 8.3.19 |
| Freebsd | Freebsd | <= 9.0 |
| Php | Php | < 5.3.14 |
| Debian | Debian Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=aab49e934de1fff046e659cbec46e3dBroken LinkPatch
- http://git.postgresql.org/gitweb/?p=postgresql.git&a=commit&h=932ded2ed51e833385Vendor Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705Third Party Advisory
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082258.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082292.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082294.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2012-1037.htmlThird Party Advisory
- http://secunia.com/advisories/49304Broken LinkVendor Advisory
- http://secunia.com/advisories/50718Broken LinkVendor Advisory
- http://security.freebsd.org/advisories/FreeBSD-SA-12:02.crypt.ascVendor Advisory
FAQ
What is CVE-2012-2143?
CVE-2012-2143 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contain...
How severe is CVE-2012-2143?
CVE-2012-2143 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2143?
Check the references section above for vendor advisories and patch information. Affected products include: Postgresql Postgresql, Freebsd Freebsd, Php Php, Debian Debian Linux.