CVE-2015-0886

Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
jpcertCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 84%
VendorProductVersion
mindrotjbcrypt
𝑥
< 0.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libjbcrypt-java
bullseye
0.4-2.1
fixed
jessie
no-dsa
wheezy
no-dsa
squeeze
no-dsa
sid
0.4-3
fixed
trixie
0.4-3
fixed
bookworm
0.4-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libjbcrypt-java
disco
not-affected
cosmic
not-affected
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
dne
precise
ignored
lucid
dne
References