The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.
References
Configurations
History
21 Nov 2024, 00:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335 - | |
References | () http://osvdb.org/38189 - | |
References | () http://osvdb.org/38190 - | |
References | () http://secunia.com/advisories/25953 - | |
References | () http://www.securityfocus.com/bid/24930 - | |
References | () https://sourceforge.net/forum/forum.php?forum_id=711619 - | |
References | () https://sourceforge.net/forum/forum.php?forum_id=711620 - Patch | |
References | () https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612 - |
Information
Published : 2007-07-03 18:30
Updated : 2024-11-21 00:33
NVD link : CVE-2007-3528
Mitre link : CVE-2007-3528
CVE.ORG link : CVE-2007-3528
JSON object : View
Products Affected
dar
- dar
CWE