{"id":"CVE-2015-0886","details":"Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.","aliases":["GHSA-9h6p-92jq-888x"],"modified":"2026-04-10T03:45:04.759491Z","published":"2015-02-28T02:59:35Z","related":["CGA-4qrx-gfvc-v53f"],"references":[{"type":"ADVISORY","url":"http://jvn.jp/en/jp/JVN77718330/index.html"},{"type":"ADVISORY","url":"http://jvndb.jvn.jp/jvndb/JVNDB-2015-000033"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html"},{"type":"ADVISORY","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html"},{"type":"ADVISORY","url":"http://www.mindrot.org/projects/jBCrypt/news/rel04.html"},{"type":"ADVISORY","url":"https://bugzilla.mindrot.org/show_bug.cgi?id=2097"},{"type":"REPORT","url":"https://bugzilla.mindrot.org/show_bug.cgi?id=2097"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rbd23e3ac8113b4da0a025c0e45170b6ec317383a1cf06090c2c717aa%40%3Ccommits.cassandra.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rd5c2256b8dc9935e4bb5e9be90adce58408054bb42523730a40c5548%40%3Ccommits.cassandra.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/re330cfe9e5d84e3f7da8ace23ec32f38cb3fbd328bf177badd7ad942%40%3Ccommits.cassandra.apache.org%3E"}],"schema_version":"1.7.5"}