Show plain JSON{"id": "CVE-2012-2317", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2012-08-07T19:55:01.437", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581170", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/04/7", "source": "secalert@redhat.com"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/05/2", "source": "secalert@redhat.com"}, {"url": "http://www.ubuntu.com/usn/USN-1481-1", "source": "secalert@redhat.com"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581170", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/04/7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2012/05/05/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.ubuntu.com/usn/USN-1481-1", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-310"}]}], "descriptions": [{"lang": "en", "value": "The Debian php_crypt_revamped.patch patch for PHP 5.3.x, as used in the php5 package before 5.3.3-7+squeeze4 in Debian GNU/Linux squeeze, the php5 package before 5.3.2-1ubuntu4.17 in Ubuntu 10.04 LTS, and the php5 package before 5.3.5-1ubuntu7.10 in Ubuntu 11.04, does not properly handle an empty salt string, which might allow remote attackers to bypass authentication by leveraging an application that relies on the PHP crypt function to choose a salt for password hashing."}, {"lang": "es", "value": "El parche de Debian php_crypt_revamped.patch para PHP v5.3.x, como el usado en el paquete php5 anterior a v5.3.3-7+squeeze4 en Debian GNU/Linux squeeze, el paquete php5 anterior a v5.3.2-1ubuntu4.17 en Ubuntu 10.04 LTS, y el paquete php5 anterior a v5.3.5-1ubuntu7.10 en Ubuntu 11.04, no gestiona de forma adecuada una cadena de salto vac\u00eda, lo que podr\u00eda permitir a atacantes remotos evitar la autenticaci\u00f3n mediante el aprovechamiento de una aplicaci\u00f3n que se basa en la funci\u00f3n crypt de PHP para elegir el salto en el proceso de obtenci\u00f3n del hash de una contrase\u00f1a."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:debian:php5-common:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DB23548-7B3B-4769-A646-C8B361EAD9B2", "versionEndIncluding": "5.3.2-1"}, {"criteria": "cpe:2.3:a:debian:php5-common:5.3.3-7\\+squeeze4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "916373DF-3FDF-4DC9-9D30-385713510607"}, {"criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C8919F1-CD33-437E-9627-69352B276BA3"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:canonical:php5:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DC21256-69D7-40ED-A68D-4756F72B4FD8", "versionEndIncluding": "5.3.2-1ubuntu4.16"}, {"criteria": "cpe:2.3:a:canonical:php5:5.3.2-1ubuntu4.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AC5AFB4-6EBA-45CB-987C-0759D0A26313"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:canonical:php5:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8409DFF-2803-4E3C-A91F-966774E7CBD3", "versionEndIncluding": "5.3.5-1ubuntu7.9"}, {"criteria": "cpe:2.3:a:canonical:php5:5.3.5-1ubuntu7.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "896CE21C-486B-4441-A5B1-6BCA93712125"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}