Poul-Henning Kamp's md5crypt password scrambler contains a flaw that may allow an attacker to run one million checks per second on COTS GPU hardware. This may make it easier for an attacker to perform a brute force attack.
Loss of Confidentiality
The vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem. It is recommended that an alternate software package be used in its place.
The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO
warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright
holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.