Think you have a false positive on this rule?

Sid 1-23896

Message

SERVER-WEBAPP PHP truncated crypt function attempt

Summary

The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

Impact

CVSS base score 4.3 CVSS impact score 2.9 CVSS exploitability score 8.6 confidentialityImpact NONE integrityImpact PARTIAL availabilityImpact PARTIAL

CVE-2012-2143:

CVSS base score 4.3

CVSS impact score 2.9

CVSS exploitability score 8.6

Confidentiality Impact NONE

Integrity Impact PARTIAL

Availability Impact NONE

Detailed information

CVE-2012-2143: The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.

Affected systems

  • php php 1.0
  • php php 2.0
  • php php 2.0b10
  • php php 3.0
  • php php 3.0.1
  • php php 3.0.2
  • php php 3.0.3
  • php php 3.0.4
  • php php 3.0.5
  • php php 3.0.6
  • php php 3.0.7
  • php php 3.0.8
  • php php 3.0.9
  • php php 3.0.10
  • php php 3.0.11
  • php php 3.0.12
  • php php 3.0.13
  • php php 3.0.14
  • php php 3.0.15
  • php php 3.0.16
  • php php 3.0.17
  • php php 3.0.18
  • php php 4.0
  • php php 4.0.0
  • php php 4.0.1
  • php php 4.0.2
  • php php 4.0.3
  • php php 4.0.4
  • php php 4.0.5
  • php php 4.0.6
  • php php 4.0.7
  • php php 4.1.0
  • php php 4.1.1
  • php php 4.1.2
  • php php 4.2.0
  • php php 4.2.1
  • php php 4.2.2
  • php php 4.2.3
  • php php 4.3.0
  • php php 4.3.1
  • php php 4.3.2
  • php php 4.3.3
  • php php 4.3.4
  • php php 4.3.5
  • php php 4.3.6
  • php php 4.3.7
  • php php 4.3.8
  • php php 4.3.9
  • php php 4.3.10
  • php php 4.3.11
  • php php 4.4.0
  • php php 4.4.1
  • php php 4.4.2
  • php php 4.4.3
  • php php 4.4.4
  • php php 4.4.5
  • php php 4.4.6
  • php php 4.4.7
  • php php 4.4.8
  • php php 4.4.9
  • php php 5.0.0
  • php php 5.0.1
  • php php 5.0.2
  • php php 5.0.3
  • php php 5.0.4
  • php php 5.0.5
  • php php 5.1.0
  • php php 5.1.1
  • php php 5.1.2
  • php php 5.1.3
  • php php 5.1.4
  • php php 5.1.5
  • php php 5.1.6
  • php php 5.2.0
  • php php 5.2.1
  • php php 5.2.2
  • php php 5.2.3
  • php php 5.2.4
  • php php 5.2.5
  • php php 5.2.6
  • php php 5.2.7
  • php php 5.2.8
  • php php 5.2.9
  • php php 5.2.10
  • php php 5.2.11
  • php php 5.2.12
  • php php 5.2.13
  • php php 5.2.14
  • php php 5.2.15
  • php php 5.2.16
  • php php 5.2.17
  • php php 5.3.0
  • php php 5.3.1
  • php php 5.3.2
  • php php 5.3.3
  • php php 5.3.4
  • php php 5.3.5
  • php php 5.3.6
  • php php 5.3.7
  • php php 5.3.8
  • php php 5.3.9
  • php php 5.3.10
  • php php 5.3.11
  • php php 5.3.12
  • php php 5.3.13
  • postgresql postgresql 8.3
  • postgresql postgresql 8.4
  • postgresql postgresql 9.0
  • postgresql postgresql 9.1
  • freebsd freebsd 1.0
  • freebsd freebsd 1.1
  • freebsd freebsd 1.1.5
  • freebsd freebsd 1.1.5.1
  • freebsd freebsd 2.0
  • freebsd freebsd 2.0.5
  • freebsd freebsd 2.1
  • freebsd freebsd 2.1.5
  • freebsd freebsd 2.1.6
  • freebsd freebsd 2.1.7
  • freebsd freebsd 2.2
  • freebsd freebsd 2.2.1
  • freebsd freebsd 2.2.2
  • freebsd freebsd 2.2.5
  • freebsd freebsd 2.2.6
  • freebsd freebsd 2.2.7
  • freebsd freebsd 2.2.8
  • freebsd freebsd 3.0
  • freebsd freebsd 3.1
  • freebsd freebsd 3.2
  • freebsd freebsd 3.3
  • freebsd freebsd 3.4
  • freebsd freebsd 3.5
  • freebsd freebsd 4.0
  • freebsd freebsd 4.1
  • freebsd freebsd 4.1.1
  • freebsd freebsd 4.2
  • freebsd freebsd 4.3
  • freebsd freebsd 4.4
  • freebsd freebsd 4.5
  • freebsd freebsd 4.6
  • freebsd freebsd 4.6.2
  • freebsd freebsd 4.7
  • freebsd freebsd 4.8
  • freebsd freebsd 4.9
  • freebsd freebsd 4.10
  • freebsd freebsd 4.11
  • freebsd freebsd 5.0
  • freebsd freebsd 5.1
  • freebsd freebsd 5.2
  • freebsd freebsd 5.2.1
  • freebsd freebsd 5.3
  • freebsd freebsd 5.4
  • freebsd freebsd 5.5
  • freebsd freebsd 6.0
  • freebsd freebsd 6.1
  • freebsd freebsd 6.2
  • freebsd freebsd 6.3
  • freebsd freebsd 6.4
  • freebsd freebsd 7.0
  • freebsd freebsd 7.1
  • freebsd freebsd 7.2
  • freebsd freebsd 7.3
  • freebsd freebsd 7.4
  • freebsd freebsd 8.0
  • freebsd freebsd 8.1
  • freebsd freebsd 8.2
  • freebsd freebsd 8.3
  • freebsd freebsd 9.0

Ease of attack

CVE-2012-2143:

Access Vector NETWORK

Access Complexity MEDIUM

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References