HIGH · 7.5

CVE-2016-20013

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

Vulnerability Description

sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
Sha256Crypt ProjectSha256Crypt<= 0.6
Sha512Crypt ProjectSha512Crypt<= 0.6

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-20013?

CVE-2016-20013 is a vulnerability with a CVSS score of 7.5 (HIGH). sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.

How severe is CVE-2016-20013?

CVE-2016-20013 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-20013?

Check the references section above for vendor advisories and patch information. Affected products include: Sha256Crypt Project Sha256Crypt, Sha512Crypt Project Sha512Crypt.