4.3
CVSSv2

CVE-2003-1480

Published: 31/12/2003 Updated: 17/12/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

MySQL 3.20 up to and including 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for malicious users to decrypt the password via brute force methods.

Vulnerable Product Search on Vulmon Subscribe to Product

oracle mysql 3.22

oracle mysql 3.22.27

oracle mysql 3.23.10

oracle mysql 3.23.22

oracle mysql 3.23.24

oracle mysql 3.23.28

oracle mysql 3.23.3

oracle mysql 3.23.36

oracle mysql 3.23.38

oracle mysql 3.23.44

oracle mysql 3.23.46

oracle mysql 3.23.50

oracle mysql 3.23.52

oracle mysql 3.23.8

oracle mysql 4.0.0

oracle mysql 4.0.8

mysql mysql 4.1.0

oracle mysql 3.22.28

oracle mysql 3.22.29

oracle mysql 3.22.30

oracle mysql 3.22.32

oracle mysql 3.23.31

oracle mysql 3.23.32

oracle mysql 3.23.33

oracle mysql 3.23.34

oracle mysql 3.23.47

oracle mysql 3.23.48

oracle mysql 3.23.49

oracle mysql 3.23.5

oracle mysql 4.0.1

oracle mysql 4.0.11

oracle mysql 4.0.2

oracle mysql 4.0.3

oracle mysql 4.0.5a

oracle mysql 3.20

oracle mysql 3.20.32a

oracle mysql 3.23.25

oracle mysql 3.23.26

oracle mysql 3.23.27

oracle mysql 3.23.39

oracle mysql 3.23.4

oracle mysql 3.23.40

oracle mysql 3.23.41

oracle mysql 3.23.42

oracle mysql 3.23.53a

oracle mysql 3.23.54

oracle mysql 3.23.54a

oracle mysql 3.23.55

oracle mysql 4.1.0

oracle mysql 3.21

oracle mysql 3.22.26

oracle mysql 3.23.2

oracle mysql 3.23.23

oracle mysql 3.23.29

oracle mysql 3.23.30

oracle mysql 3.23.35

oracle mysql 3.23.37

oracle mysql 3.23.43

oracle mysql 3.23.45

oracle mysql 3.23.51

oracle mysql 3.23.53

oracle mysql 3.23.56

oracle mysql 3.23.9

oracle mysql 4.0.7

oracle mysql 4.0.9

Exploits

source: wwwsecurityfocuscom/bid/7500/info MySQL has been reported to implement a weak password encryption algorithm It has been reported that the MySQL function used to encrypt MySQL passwords makes just one pass over the password and employs a weak left shift based cipher The hash may be cracked in little time using a bruteforce method ...