Vulnerability Details : CVE-2012-2742
Revelation 0.4.13-2 and earlier uses only the first 32 characters of a password followed by a sequence of zeros, which reduces the entropy and makes it easier for context-dependent attackers to crack passwords and obtain access to keys via a brute-force attack.
Exploit prediction scoring system (EPSS) score for CVE-2012-2742
Probability of exploitation activity in the next 30 days: 0.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-2742
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-2742
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2742
- http://oss.codepoet.no/revelation/issue/61/file-format-magic-string-version-mismatch
-
http://www.openwall.com/lists/oss-security/2012/06/18/1
oss-security - CVE Request -- Revelation: 1) Limits effective password length to 32 characters 2) Doesn't iterate the passphrase through SHA algorithm to derive the encryption key
-
http://www.securityfocus.com/bid/54060
Revelation Multiple Security Weaknesses
-
http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html
The Litany of Knox in Box: Revelation password manager considered harmful (but now fixed)
-
http://www.openwall.com/lists/oss-security/2012/06/18/3
oss-security - Re: CVE Request -- Revelation: 1) Limits effective password length to 32 characters 2) Doesn't iterate the passphrase through SHA algorithm to derive the encryption key
-
https://bugs.gentoo.org/show_bug.cgi?id=421571
421571 – (CVE-2012-3818) <x11-misc/revelation-0.4.14 : Too weak encryption / file format to be considered as a password manager (CVE-2012-3818)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/76407
Revelation password length weak security CVE-2012-2742 Vulnerability Report
Products affected by CVE-2012-2742
- cpe:2.3:a:mikel_olasagasti:revelation:*:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mikel_olasagasti:revelation:0.1.0:*:*:*:*:*:*:*