sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2016-3101 | sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:47:34.906Z
Reserved: 2022-02-19T00:00:00
Link: CVE-2016-20013

No data.

Status : Modified
Published: 2022-02-19T05:15:09.413
Modified: 2024-11-21T02:47:33.427
Link: CVE-2016-20013

No data.

No data.