PasswordSafe 3.0 beta, when running on Windows before XP, uses a weak random number generator (C++ rand function) during generation of the database encryption key, which makes it easier for attackers to decrypt the database and steal passwords by generating keys for all possible rand() seed values and conducting a known plaintext attack.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/618 - | |
References | () http://www.securityfocus.com/archive/1/428552/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/445509/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17200 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25429 - |
Information
Published : 2006-03-24 02:02
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1378
Mitre link : CVE-2006-1378
CVE.ORG link : CVE-2006-1378
JSON object : View
Products Affected
counterpane
- password_safe
CWE