Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, uses the DES-based crypt function to hash passwords, which makes it easier for attackers to obtain sensitive information via a brute-force attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_mrg | Redhat | 2.5 (including) | 2.5 (including) |
MRG for RHEL-5 v. 2 | RedHat | cumin-0:0.1.5796-2.el5_9 | * |
MRG for RHEL-5 v. 2 | RedHat | mrg-release-0:2.5.0-1.el5 | * |
Red Hat Enterprise MRG 2 | RedHat | condor-0:7.8.10-0.1.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | cumin-0:0.1.5797-1.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | mongodb-0:1.6.4-7.el6 | * |
Red Hat Enterprise MRG 2 | RedHat | mrg-release-0:2.5.0-1.el6 | * |