CVE-2011-2082
Publication date 4 June 2012
Last updated 24 July 2024
Ubuntu priority
The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.
Status
Package | Ubuntu Release | Status |
---|---|---|
request-tracker3.6 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
request-tracker3.8 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
request-tracker4 | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
Patch details
Package | Patch details |
---|---|
request-tracker3.8 | |
request-tracker4 |