Vulnerabilities > CVE-2003-1480 - Cryptographic Issues vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mysql
oracle
CWE-310
nessus
exploit available

Summary

MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Exploit-Db

descriptionMySQL 3.x/4.0.x Weak Password Encryption Vulnerability. CVE-2003-1480. Local exploit for linux platform
idEDB-ID:22565
last seen2016-02-02
modified2003-05-05
published2003-05-05
reporterSecret Squirrel
sourcehttps://www.exploit-db.com/download/22565/
titleMySQL 3.x/4.0.x Weak Password Encryption Vulnerability

Nessus

NASL familyDatabases
NASL idMYSQL_4_1.NASL
descriptionThe version of MySQL installed on the remote host is older than 4.1.1. As such, it reportedly uses a weak algorithm to hash the passwords. A attacker who can read the mysql.user table will be able to retrieve the plaintext passwords quickly by brute-force attack.
last seen2020-06-01
modified2020-06-02
plugin id17824
published2012-01-18
reporterThis script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/17824
titleMySQL Weak Hash Algorithm
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(17824);
  script_version("1.6");
  script_cvs_date("Date: 2018/07/16 14:09:12");

  script_bugtraq_id(7500);
  script_cve_id("CVE-2003-1480");

  script_name(english:"MySQL Weak Hash Algorithm");
  script_summary(english:"Checks version of MySQL Server");

  script_set_attribute(attribute:"synopsis", value:
"Passwords could be brute-forced on the remote database server.");

  script_set_attribute(attribute:"description", value:
"The version of MySQL installed on the remote host is older than
4.1.1.  As such, it reportedly uses a weak algorithm to hash the
passwords.  A attacker who can read the mysql.user table will be able
to retrieve the plaintext passwords quickly by brute-force attack.");
  script_set_attribute(attribute:"see_also", value:"http://dev.mysql.com/doc/refman/5.0/en/application-password-use.html");
  script_set_attribute(attribute:"solution", value:"Upgrade to MySQL version 4.1.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(310);

  script_set_attribute(attribute:"vuln_publication_date", value:"2003/05/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/01/18");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mysql:mysql");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Databases");

  script_copyright(english:"This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mysql_version.nasl", "mysql_login.nasl");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports("Services/mysql", 3306);

  exit(0);
}


include("mysql_version.inc");

mysql_check_version(fixed:'4.1.1', severity:SECURITY_WARNING);