fedora 24
crypto weakness #301


Weakness Breakdown


This weakness involves creating non-standard or non-tested algorithms, using weak algorithms or applying cryptographic algorithms incorrectly. Algorithms that were once considered safe are commonly later found to be unsafe, as the algorithms were broken.

Warning code(s):

The crypt functions use a poor one-way hashing algorithm; since they only accept passwords of 8 characters or fewer and only a two-byte salt, they are excessively vulnerable to dictionary attacks given today's faster computing equipment.

File Name:



The highlighted line of code below is the trigger point of this particular Fedora 24 crypto weakness.

  *		Networks and Distributed Computing
 *		Computing & Communications
 *		University of Washington
 *		Administration Building, AG-44
 *		Seattle, WA  98195
 *		Internet: MRC@CAC.Washington.EDU
 * Date:	1 August 1988
 * Last Edited:	30 August 2006
/* Check password
 * Accepts: login passwd struct
 *	    password string
 *	    argument count
 *	    argument vector
 * Returns: passwd struct if password validated, NIL otherwise

struct passwd *checkpw (struct passwd *pw,char *pass,int argc,char *argv[])
  struct es_passwd *pp;
  set_auth_parameters (argc,argv);
  if ((pw->pw_passwd && pw->pw_passwd[0] && pw->pw_passwd[1] &&
       !strcmp (pw->pw_passwd,(char *) crypt (pass,pw->pw_passwd))) ||
      ((pp = getespwnam (pw->pw_name)) && !pp->ufld->fd_lock &&
       !pp->ufld->fd_psw_chg_reqd &&
       pp->ufld->fd_encrypt && pp->ufld->fd_encrypt[0] &&
       pp->ufld->fd_encrypt[1] &&
       !strcmp (pp->ufld->fd_encrypt,bigcrypt (pass,pp->ufld->fd_encrypt))))
    endprpwent ();		/* don't need shadow password data any more */
  else pw = NIL;		/* password failed */
  return pw;

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.