jvndb-2015-000119
Vulnerability from jvndb
Published
2015-08-27 15:03
Modified
2015-09-02 17:57
Summary
File Encryption Software "ED" where encrypted data may be easier to decipher when files of small size are encrypted
Details
File encyption software "ED" contains an issue when files of small size are encyrpted, they may become easier to decipher in comparison to when files of a larger size are encrypted.
When encrypting small files that are smaller than the block size (128 bits), file encryption software "ED" encrypts such files with "a stream cipher combining ECB mode of the selected encryption algorithm on key generation". This results in deciphering the resulting encrypted data to become relatively easy. For more details on this specification, pelase refer to the documentation (http://type74.org/edman5-1.php) provided by the developer.
Yutaka Sawada reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000119.html",
"dc:date": "2015-09-02T17:57+09:00",
"dcterms:issued": "2015-08-27T15:03+09:00",
"dcterms:modified": "2015-09-02T17:57+09:00",
"description": "File encyption software \"ED\" contains an issue when files of small size are encyrpted, they may become easier to decipher in comparison to when files of a larger size are encrypted.\r\n\r\nWhen encrypting small files that are smaller than the block size (128 bits), file encryption software \"ED\" encrypts such files with \"a stream cipher combining ECB mode of the selected encryption algorithm on key generation\". This results in deciphering the resulting encrypted data to become relatively easy. For more details on this specification, pelase refer to the documentation (http://type74.org/edman5-1.php) provided by the developer.\r\n\r\nYutaka Sawada reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000119.html",
"sec:cpe": {
"#text": "cpe:/a:type74:ed",
"@product": "File encryption software \"ED\"",
"@vendor": "Type74.org",
"@version": "2.2"
},
"sec:cvss": {
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2015-000119",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN91474878/index.html",
"@id": "JVN#91474878",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2987",
"@id": "CVE-2015-2987",
"@source": "CVE"
},
{
"#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2987",
"@id": "CVE-2015-2987",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-DesignError",
"@title": "No Mapping(CWE-DesignError)"
}
],
"title": "File Encryption Software \"ED\" where encrypted data may be easier to decipher when files of small size are encrypted"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…