ID CVE-2006-1378
Summary PasswordSafe 3.0 beta, when running on Windows before XP, uses a weak random number generator (C++ rand function) during generation of the database encryption key, which makes it easier for attackers to decrypt the database and steal passwords by generating keys for all possible rand() seed values and conducting a known plaintext attack. This vulnerability exists only in Windows OS environments before XP. For some reason it would not let me notate that in the "vulnerable software" section.
References
Vulnerable Configurations
  • cpe:2.3:a:counterpane:password_safe:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:counterpane:password_safe:3.0:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 18-10-2018 - 16:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:N/A:N
refmap via4
bid 17200
bugtraq
  • 20060323 PasswordSafe 3.0 weak random number generator allows key recovery attack
  • 20060907 Re: PasswordSafe 3.0 weak random number generator allows key recovery attack
sreason 618
xf passwordsafe-key-brute-force(25429)
Last major update 18-10-2018 - 16:32
Published 24-03-2006 - 02:02
Last modified 18-10-2018 - 16:32
Back to Top