Zetetic Secure Tool for Recalling Important Passwords (STRIP) 0.5 and earlier for the PalmOS allows a local attacker to recover passwords via a brute force attack. This attack is made feasible by STRIP's use of SysRandom, which is seeded by TimeGetTicks, and an implementation flaw which vastly reduces the password 'search space'.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-04/0169.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/2567 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6362 | |
http://archives.neohapsis.com/archives/bugtraq/2001-04/0169.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/2567 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6362 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-04/0169.html - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2567 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6362 - |
Information
Published : 2001-08-02 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0597
Mitre link : CVE-2001-0597
CVE.ORG link : CVE-2001-0597
JSON object : View
Products Affected
zetetic_enterprises
- strip
CWE