5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
postgresql is vulnerable to brute-force attacks. The vulnerability exists as a signedness issue was found in the way the crypt() function in the PostgreSQL pgcrypto module handled 8-bit characters in passwords when using Blowfish hashing. Up to three characters immediately preceding a non-ASCII character (one with the high bit set) had no effect on the hash result, thus shortening the effective password length. This made brute-force guessing more efficient as several different passwords were hashed to the same value.
freshmeat.net/projects/crypt_blowfish
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html
php.net/security/crypt_blowfish
support.apple.com/kb/HT5130
www.debian.org/security/2011/dsa-2340
www.debian.org/security/2012/dsa-2399
www.mandriva.com/security/advisories?name=MDVSA-2011:165
www.mandriva.com/security/advisories?name=MDVSA-2011:178
www.mandriva.com/security/advisories?name=MDVSA-2011:179
www.mandriva.com/security/advisories?name=MDVSA-2011:180
www.openwall.com/crypt/
www.php.net/archive/2011.php#id2011-08-18-1
www.php.net/ChangeLog-5.php#5.3.7
www.postgresql.org/docs/8.4/static/release-8-4-9.html
www.postgresql.org/docs/8.4/static/release.html
www.redhat.com/support/errata/RHSA-2011-1377.html
www.redhat.com/support/errata/RHSA-2011-1378.html
www.redhat.com/support/errata/RHSA-2011-1423.html
www.securityfocus.com/bid/49241
www.ubuntu.com/usn/USN-1229-1
access.redhat.com/errata/RHSA-2011:1377
access.redhat.com/security/updates/classification/#moderate
exchange.xforce.ibmcloud.com/vulnerabilities/69319