{"id":"UBUNTU-CVE-2009-4269","details":"The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by generating hash collisions, related to password substitution.","modified":"2025-10-24T04:44:50Z","published":"2010-08-16T20:00:00Z","upstream":["CVE-2009-4269"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2009-4269"},{"type":"REPORT","url":"http://blogs.sun.com/kah/entry/derby_10_6_1_has"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2009-4269"}],"affected":[{"package":{"name":"sun-javadb","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/sun-javadb@10.3.2.1-0ubuntu2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["10.3.2.1-0ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"sun-javadb-client","binary_version":"10.3.2.1-0ubuntu2"},{"binary_name":"sun-javadb-common","binary_version":"10.3.2.1-0ubuntu2"},{"binary_name":"sun-javadb-core","binary_version":"10.3.2.1-0ubuntu2"},{"binary_name":"sun-javadb-demo","binary_version":"10.3.2.1-0ubuntu2"},{"binary_name":"sun-javadb-javadoc","binary_version":"10.3.2.1-0ubuntu2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2009/UBUNTU-CVE-2009-4269.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}