Lucene search

K
githubGitHub Advisory DatabaseGHSA-9H6P-92JQ-888X
HistoryMay 13, 2022 - 1:05 a.m.

Integer Overflow or Wraparound in JBCrypt

2022-05-1301:05:53
CWE-190
GitHub Advisory Database
github.com
10

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

76.3%

Integer overflow in the crypt_raw method in the key-stretching implementation in JBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.

Affected configurations

Vulners
Node
org.mindrot\Matchjbcrypt
CPENameOperatorVersion
org.mindrot:jbcryptlt0.4

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

76.3%