---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: openSUSE libxcrypt MD5 Password Hash Configuration Weakness SECUNIA ADVISORY ID: SA31096 VERIFY ADVISORY: http://secunia.com/advisories/31096/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: Local system OPERATING SYSTEM: openSUSE 11.0 http://secunia.com/product/19180/ DESCRIPTION: SUSE has acknowledged a weakness in libxcrypt, which results in potentially weaker security and may allow further attacks. The weakness is caused due to libxcrypt using the DES algorithm to generate password hashes, although the MD5 algorithm is configured in /etc/default/passwd. SOLUTION: Apply updated packages and regenerate all passwords. x86 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libxcrypt-3.0-14.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libxcrypt-devel-3.0-14.2.i586.rpm x86-64 Platform: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/libxcrypt-32bit-3.0-14.2.x86_64.rpm Sources: openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/libxcrypt-3.0-14.2.src.rpm PROVIDED AND/OR DISCOVERED BY: Thomas Schulte ORIGINAL ADVISORY: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00008.html https://bugzilla.novell.com/show_bug.cgi?id=408719 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------