SecureKit Steganography 1.7.1 and 1.8 embeds password information in the carrier file, which allows remote attackers to bypass authentication requirements and decrypt embedded steganography by replacing the last 20 bytes of the JPEG image with alternate password information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://homepage.mac.com/adonismac/Advisory/steg/steganography.html - Exploit, Vendor Advisory | |
References | () http://osvdb.org/31244 - | |
References | () http://secunia.com/advisories/23639 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/456283/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/456519/100/0/threaded - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31378 - |
Information
Published : 2007-01-10 00:28
Updated : 2024-11-21 00:25
NVD link : CVE-2007-0163
Mitre link : CVE-2007-0163
CVE.ORG link : CVE-2007-0163
JSON object : View
Products Affected
securekit
- securekit_steganography
CWE