Description
The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
Published: 2010-08-16
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-3779 The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.
Github GHSA Github GHSA GHSA-fh32-35w2-rxcc Use of Password Hash With Insufficient Computational Effort in Apache Derby
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T06:54:10.308Z

Reserved: 2009-12-10T00:00:00.000Z

Link: CVE-2009-4269

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-08-16T20:00:01.183

Modified: 2025-04-11T00:51:21.963

Link: CVE-2009-4269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses