ID |
CVE-2006-1378
|
Summary |
PasswordSafe 3.0 beta, when running on Windows before XP, uses a weak random number generator (C++ rand function) during generation of the database encryption key, which makes it easier for attackers to decrypt the database and steal passwords by generating keys for all possible rand() seed values and conducting a known plaintext attack. This vulnerability exists only in Windows OS environments before XP. For some reason it would not let me notate that in the "vulnerable software" section. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.9 (as of 18-10-2018 - 16:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
NONE |
NONE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:N/A:N
|
refmap
via4
|
bid | 17200 | bugtraq | - 20060323 PasswordSafe 3.0 weak random number generator allows key recovery attack
- 20060907 Re: PasswordSafe 3.0 weak random number generator allows key recovery attack
| sreason | 618 | xf | passwordsafe-key-brute-force(25429) |
|
Last major update |
18-10-2018 - 16:32 |
Published |
24-03-2006 - 02:02 |
Last modified |
18-10-2018 - 16:32 |