Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 30 Oct 2012 13:23:10 -0600
From: Raphael Geissert <geissert@...ian.org>
To: oss-security@...ts.openwall.com,
 coley <coley@...re.org>
Subject: Re: Strange CVE situation (at least one ID should come of this)

On Friday 26 October 2012 14:54:15 Josh Bressers wrote:
> * It uses MD5 passwords
> * The shadow file is directly modified without locking (which could lead
> to a race condition)
> * If you get the password wrong, it doesn't unlink the empty temporary
> file.

By looking at the README:
* It leaks the password via the process list

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.