sha256crypt and sha512crypt through 0.6 allow attackers...
High severity
Unreviewed
Published
Feb 20, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Feb 19, 2022
Published to the GitHub Advisory Database
Feb 20, 2022
Last updated
Feb 3, 2023
sha256crypt and sha512crypt through 0.6 allow attackers to cause a denial of service (CPU consumption) because the algorithm's runtime is proportional to the square of the length of the password.
References