First published: Wed Dec 31 2003(Updated: )
RTS CryptoBuddy 1.0 and 1.2 uses a weak encryption algorithm for the passphrase and generates predictable keys, which makes it easier for attackers to guess the passphrase.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Research Triangle Software CryptoBuddy | =1.0 | |
Research Triangle Software CryptoBuddy | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1391 is considered to have a medium severity due to its weak encryption making passphrase guessing easier for attackers.
To fix CVE-2003-1391, update to a newer version of CryptoBuddy or switch to a more secure encryption solution.
CVE-2003-1391 affects CryptoBuddy versions 1.0 and 1.2.
CVE-2003-1391 is a cryptographic vulnerability related to weak encryption algorithms.
CVE-2003-1391 potentially exposes user passphrases to attackers due to predictable key generation.