First published: Fri Sep 17 2010(Updated: )
EncFS before 1.7.0 encrypts multiple blocks by means of the CFB cipher mode with the same initialization vector, which makes it easier for local users to obtain sensitive information via calculations involving recovery of XORed data, as demonstrated by an attack on encrypted data in which the last block contains only one byte.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Encfs | =1.4.0 | |
Encfs | <=1.6.0 | |
Encfs | =1.4.2 | |
Encfs | =1.4.1 | |
Encfs | =1.5.0 | |
Encfs | =1.4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3075 is classified as a medium severity vulnerability due to the exposure of sensitive information.
To fix CVE-2010-3075, upgrade to EncFS version 1.7.0 or later which resolves the initialization vector issue.
CVE-2010-3075 affects EncFS versions 1.4.0 through 1.6.0, as well as specific versions such as 1.4.1, 1.4.1.1, and 1.5.0.
CVE-2010-3075 can allow local users to recover sensitive information by exploiting encryption weaknesses in the affected versions.
No, it is not safe to use EncFS versions prior to 1.7.0 as they are vulnerable to potential data breaches.