TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.  NOTE: the researcher mentions a response from the vendor denying the vulnerability.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://securityreason.com/securityalert/4203 - | |
| References | () http://www.ivizsecurity.com/preboot-patch.html - | |
| References | () http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf - | |
| References | () http://www.securityfocus.com/archive/1/495805/100/0/threaded - | 
Information
                Published : 2008-09-03 14:12
Updated : 2025-04-09 00:30
NVD link : CVE-2008-3899
Mitre link : CVE-2008-3899
CVE.ORG link : CVE-2008-3899
JSON object : View
Products Affected
                truecrypt_foundation
- truecrypt
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
