Bug 863974 (CVE-2014-0083) - VUL-1: CVE-2014-0083: rubygem-net-ldap: weak salt in password generation
Summary: VUL-1: CVE-2014-0083: rubygem-net-ldap: weak salt in password generation
Status: RESOLVED UPSTREAM
Alias: CVE-2014-0083
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-02-14 09:55 UTC by Alexander Bergmann
Modified: 2015-03-05 14:53 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-02-14 09:55:52 UTC
The salting inside password.rb is insufficient as the random salt can only be between 0 and 999. 

> salt = (rand * 1000).to_i.to_s

SLE and openSUSE are not affected as the salting feature is not included.


CVE-2014-0083 was assigned to this issue.

References:
https://github.com/ruby-ldap/ruby-net-ldap/blob/master/lib/net/ldap/password.rb
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0083
https://bugzilla.redhat.com/show_bug.cgi?id=1065086
Comment 1 Alexander Bergmann 2014-02-14 09:56:20 UTC
Closed. Fixed upstream.