First published: Fri Jan 03 2014(Updated: )
It was found that kwallet, a tool for managing the passwords on a KDE system, uses Blowfish to encrypt its password store, and despite an attempt at implementing CBC mode (in a file called cbc.cc no less), it's actually ECB mode. UTF-16 encoding combined with Blowfish's 64 bit block size means there are just four password characters per block. Encryption is convergent as well. The risk is that this may enable recovery of passwords through codebook attacks. References: <a href="http://seclists.org/oss-sec/2014/q1/2">http://seclists.org/oss-sec/2014/q1/2</a> <a href="http://gaganpreet.in/blog/2013/07/24/kwallet-security-analysis/">http://gaganpreet.in/blog/2013/07/24/kwallet-security-analysis/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
KDE Applications | <=14.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7252 is considered a medium severity vulnerability due to its potential impact on confidentiality.
To mitigate CVE-2013-7252, update to a version of KDE Applications beyond 14.11.3 where the issue has been addressed.
CVE-2013-7252 affects KDE Applications versions up to and including 14.11.3.
CVE-2013-7252 is compromised due to the misuse of ECB mode in the encryption process instead of the intended CBC mode.
The main risk associated with CVE-2013-7252 is that it may allow unauthorized users to infer sensitive information from the encrypted password store.