Name | CVE-2011-2483 |
Description | crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-2340-1, DSA-2399-1 |
Debian Bugs | 631283, 631285, 631347, 679628 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libcrypt-eksblowfish-perl (PTS) | bullseye | 0.009-2 | fixed |
bookworm, sid, trixie | 0.009-3 | fixed | |
libxcrypt (PTS) | bullseye | 1:4.4.18-4 | fixed |
bookworm | 1:4.4.33-2 | fixed | |
sid, trixie | 1:4.4.36-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libcrypt-eksblowfish-perl | source | (unstable) | (not affected) | |||
libxcrypt | source | (unstable) | 1:2.4-1.1 | 679628 | ||
php-suhosin | source | lenny | (unfixed) | 631283 | ||
php-suhosin | source | (unstable) | (not affected) | |||
php5 | source | lenny | 5.2.6.dfsg.1-1+lenny14 | DSA-2399-1 | ||
php5 | source | squeeze | 5.3.3-7+squeeze5 | DSA-2399-1 | ||
php5 | source | (unstable) | 5.3.6-13 | 631347 | ||
postgresql-8.3 | source | lenny | 8.3.16-0lenny1 | DSA-2340-1 | ||
postgresql-8.4 | source | squeeze | 8.4.9-0squeeze1 | DSA-2340-1 | ||
postgresql-8.4 | source | (unstable) | 8.4.9-1 | 631285 | ||
postgresql-9.0 | source | (unstable) | 9.0.5-1 | 631285 | ||
postgresql-9.1 | source | (unstable) | 9.1~rc1-1 |
- libcrypt-eksblowfish-perl <not-affected> (discovered and corrected in initial release in 2007)
- php-suhosin <not-affected> (bug #631283; that portion is not used since PHP 5.3)
[squeeze] - libxcrypt <no-dsa> (Minor issue)
http://openwall.com/lists/oss-security/2011/06/20/2