Vulnerability Details : CVE-2007-3528
The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.
Products affected by CVE-2007-3528
- cpe:2.3:a:dar:dar:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3528
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3528
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2007-3528
-
https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612
SourceForge.net: Log In to SourceForge.net
-
http://www.securityfocus.com/bid/24930
-
http://osvdb.org/38190
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335
#425335 - dar: blowfish encryption weakened by frequent IV collisions - Debian Bug report logs
-
http://osvdb.org/38189
-
https://sourceforge.net/forum/forum.php?forum_id=711620
Page not found - SourceForge.netPatch
-
http://secunia.com/advisories/25953
About Secunia Research | Flexera
-
https://sourceforge.net/forum/forum.php?forum_id=711619
Page not found - SourceForge.net
Jump to