Vulnerability Details : CVE-2014-9687
Potential exploit
eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
Products affected by CVE-2014-9687
- cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9687
0.52%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9687
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-9687
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9687
-
http://www.openwall.com/lists/oss-security/2015/02/17/7
oss-security - CVE request: Linux kernel ecryptfs 1-byte overwrite
-
http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html
openSUSE-SU-2016:0291-1: moderate: Security update for ecryptfs-utils
-
http://www.openwall.com/lists/oss-security/2015/02/10/16
oss-security - Re: eCryptfs key wrapping help to crack user password
-
http://www.openwall.com/lists/oss-security/2015/02/28/3
oss-security - Re: eCryptfs key wrapping help to crack user password
-
https://bugs.launchpad.net/ecryptfs/+bug/906550
Bug #906550 “ecryptfs-setup-private should create an .ecryptfsrc...” : Bugs : eCryptfsExploit
-
http://www.ubuntu.com/usn/USN-2524-1
USN-2524-1: eCryptfs vulnerability | Ubuntu security noticesVendor Advisory
Jump to