Description
BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6Attack Vector: Local
Complexity: Low
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: None
Availability: None
Affected Packages5 packages
🔴Vulnerability Details
3GHSAGHSA-25qj-gfr4-9mhj: BusyBox 1↗2022-05-01 ▶ OSVCVE-2006-1058: BusyBox 1↗2006-04-04 ▶ CVEListCVE-2006-1058: BusyBox 1↗2006-04-04 ▶ 📋Vendor Advisories
2DebianCVE-2006-1058: busybox - BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easi...↗2006 ▶ 💬Community
3BugzillaCVE-2006-1058 security flaw↗2018-08-16 ▶ BugzillaCVE-2006-1058 BusyBox passwd command fails to generate password with salt↗2006-03-30 ▶ BugzillaCVE-2006-1058 BusyBox passwd command fails to generate password with salt↗2006-03-30 ▶