Anyone who has access to the INI file where the CRC'd password is stored could CRC a huge list of passwords from dictionary files. If they find a matching CRC they're in.
But, it would be even easier for them to think up their own password, CRC it, and save that in your INI file.
It depends on who your application is intended for, the environment it will operate in, and what it is intended to protect. If you're just looking to confuse things a little further you could maybe expand on the CRC so it doesn't necessarily 'look' like a CRC (different number of characters, ranges, etc.)
Hope this helps.
-John