Vulnerabilities > CVE-2006-1058 - Use of Password Hash With Insufficient Computational Effort vulnerability in multiple products

047910
CVSS 5.5 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
local
low complexity
busybox
avaya
CWE-916
nessus

Summary

BusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.

Nessus

  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20070501_BUSYBOX_ON_SL4_X.NASL
    descriptionBusyBox did not use a salt when generating passwords. This made it easier for local users to guess passwords from a stolen password file. (CVE-2006-1058)
    last seen2020-06-01
    modified2020-06-02
    plugin id60162
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60162
    titleScientific Linux Security Update : busybox on SL4.x i386/x86_64
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-0244.NASL
    descriptionUpdated busybox packages that fix a security issue are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. Busybox is a single binary which includes versions of a large number of system commands, including a shell. This package can be useful for recovering from certain types of system failures. BusyBox did not use a salt when generating passwords. This made it easier for local users to guess passwords from a stolen password file. (CVE-2006-1058) All users of busybox are advised to upgrade to these updated packages, which contain a patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id25140
    published2007-05-02
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/25140
    titleRHEL 4 : busybox (RHSA-2007:0244)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-0244.NASL
    descriptionUpdated busybox packages that fix a security issue are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. Busybox is a single binary which includes versions of a large number of system commands, including a shell. This package can be useful for recovering from certain types of system failures. BusyBox did not use a salt when generating passwords. This made it easier for local users to guess passwords from a stolen password file. (CVE-2006-1058) All users of busybox are advised to upgrade to these updated packages, which contain a patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67044
    published2013-06-29
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67044
    titleCentOS 4 : busybox (CESA-2007:0244)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-0244.NASL
    descriptionFrom Red Hat Security Advisory 2007:0244 : Updated busybox packages that fix a security issue are now available. This update has been rated as having low security impact by the Red Hat Security Response Team. Busybox is a single binary which includes versions of a large number of system commands, including a shell. This package can be useful for recovering from certain types of system failures. BusyBox did not use a salt when generating passwords. This made it easier for local users to guess passwords from a stolen password file. (CVE-2006-1058) All users of busybox are advised to upgrade to these updated packages, which contain a patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67478
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67478
    titleOracle Linux 4 : busybox (ELSA-2007-0244)

Oval

accepted2013-04-29T04:19:41.563-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionBusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
familyunix
idoval:org.mitre.oval:def:9483
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleBusyBox 1.1.1 does not use a salt when generating passwords, which makes it easier for local users to guess passwords from a stolen password file using techniques such as rainbow tables.
version26

Redhat

advisories
bugzilla
id187385
titleCVE-2006-1058 BusyBox passwd command fails to generate password with salt
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentbusybox-anaconda is earlier than 0:1.00.rc1-7.el4
          ovaloval:com.redhat.rhsa:tst:20070244001
        • commentbusybox-anaconda is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070244002
      • AND
        • commentbusybox is earlier than 0:1.00.rc1-7.el4
          ovaloval:com.redhat.rhsa:tst:20070244003
        • commentbusybox is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20070244004
rhsa
idRHSA-2007:0244
released2007-05-01
severityLow
titleRHSA-2007:0244: busybox security update (Low)
rpms
  • busybox-0:1.00.rc1-7.el4
  • busybox-anaconda-0:1.00.rc1-7.el4
  • busybox-debuginfo-0:1.00.rc1-7.el4

Statements

contributorMark J Cox
lastmodified2006-09-19
organizationRed Hat
statementRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.