CVE-2011-2483
Publication date 25 August 2011
Last updated 24 July 2024
Ubuntu priority
crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
Status
Package | Ubuntu Release | Status |
---|---|---|
john | ||
14.04 LTS trusty | Not in release | |
libcrypt-eksblowfish-perl | ||
14.04 LTS trusty | Not in release | |
php5 | ||
14.04 LTS trusty |
Not affected
|
|
postgresql-8.2 | ||
14.04 LTS trusty | Not in release | |
postgresql-8.3 | ||
14.04 LTS trusty | Not in release | |
postgresql-8.4 | ||
14.04 LTS trusty | Not in release | |
postgresql-9.1 | ||
14.04 LTS trusty | Not in release | |
Notes
jdstrand
libcrypt-eksblowfish-perl not affected per Debian (fixed in 2007) see redhat bug on php5 patches. A regression was introduced in 5.3.7 postgresql needs more than upstream patch
mdeslaur
setting john priority to low, since it's not really a security issue, and Ubuntu doesn't use blowfish hashes.
Patch details
Package | Patch details |
---|---|
john | |
postgresql-9.1 |
References
Related Ubuntu Security Notices (USN)
- USN-1231-1
- PHP Vulnerabilities
- 18 October 2011
- USN-1229-1
- PostgreSQL vulnerability
- 13 October 2011