Vulnerabilities > CVE-2009-4269 - Cryptographic Issues vulnerability in Apache Derby
Summary
The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution. Per https://issues.apache.org/jira/browse/DERBY-4483, the reported version affected is 10.5.3.0. Unable to determine if affected versions exist between 10.5.3.0 and 10.6.1.0
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family | Databases |
NASL id | DERBY_10_6_1_0.NASL |
description | According to its self-reported version number, the installation of Apache Derby running on the remote server performs a transformation on passwords that removes half the bits from most of the characters before hashing. This leads to a large number of hash collisions, letting passwords be easily brute-forced. This vulnerability only affects the BUILTIN authentication method. Note that Nessus has not tested for the issue but has instead relied only on the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 52536 |
published | 2011-03-03 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/52536 |
title | Apache Derby 'BUILTIN' Authentication Insecure Password Hashing |
code |
|
References
- http://blogs.sun.com/kah/entry/derby_10_6_1_has
- http://db.apache.org/derby/releases/release-10.6.1.0.cgi#Fix+for+Security+Bug+CVE-2009-4269
- http://marc.info/?l=apache-db-general&m=127428514905504&w=1
- http://marcellmajor.com/derbyhash.html
- http://secunia.com/advisories/42948
- http://secunia.com/advisories/42970
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
- http://www.securityfocus.com/bid/42637
- http://www.securitytracker.com/id?1024977
- http://www.vupen.com/english/advisories/2011/0149
- https://issues.apache.org/jira/browse/DERBY-4483