CVE-2015-0886

EUVD-2022-3379
Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
Affected Products (NVD)
VendorProductVersion
mindrotjbcrypt
𝑥
< 0.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libjbcrypt-java
bookworm
0.4-3
fixed
bullseye
0.4-2.1
fixed
jessie
no-dsa
sid
0.4-3
fixed
squeeze
no-dsa
trixie
0.4-3
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libjbcrypt-java
artful
ignored
bionic
not-affected
cosmic
not-affected
disco
not-affected
lucid
dne
precise
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
ignored
References