First published: Tue Aug 21 2012(Updated: )
The geli encryption provider 7 before r239184 on FreeBSD 10 uses a weak Master Key, which makes it easier for local users to defeat a cryptographic protection mechanism via a brute-force attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pawel Jakub Dawidek Geli | <=7 | |
Pawel Jakub Dawidek Geli | =4 | |
FreeBSD Kernel | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4578 is considered a medium-severity vulnerability due to its potential to allow local users to decrypt sensitive information.
To fix CVE-2012-4578, upgrade the geli encryption provider to version 7 r239184 or later on FreeBSD 10.
CVE-2012-4578 affects users utilizing the geli encryption provider version 7 before r239184 on FreeBSD 10 and is particularly relevant for local users.
CVE-2012-4578 can be exploited using a brute-force attack against a weak Master Key, compromising encrypted data.
While the best solution is to upgrade, users can temporarily strengthen password complexity to help mitigate the immediate risks of CVE-2012-4578.