Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 18 Jun 2012 11:10:51 -0600
From: Kurt Seifried <>
CC: Jan Lieskovsky <>,
        "Steven M. Christey" <>,
        Josh Bressers <>
Subject: Re: CVE Request -- Revelation: 1) Limits effective
 password length to 32 characters 2) Doesn't iterate the passphrase through
 SHA algorithm to derive the encryption key

Hash: SHA1

On 06/18/2012 07:32 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> multiple security flaws have been found in Revelation, a password 
> manager for GNOME 2. Specifically:
> 1) It was found that Revelation limited effective password lengths
> to thirty two characters, which made it easier for
> context-dependent attackers to successfully conduct brute-force 
> password guessing attacks,

Please use CVE-2012-2742 for this issue

> 2) It was found that Revelation did not iterate the particular 
> passphrase through some of the SHA family of hashing algorithms, in
> order to derive the encryption key, which made it easier (in that
> scenario there were only 7 bits to vary on each character) for
> context-dependent attackers to successfully conduct dictionary
> based password guessing attacks.

Please use CVE-2012-2743 for this issue.

Assigned 2012 CVE's as the first clear mention of the issues is in the ticket. The Blog entry for 2010 mentions the issue
indirectly so I'm going with the more concrete mention.

> Upstream ticket: [1] 
> Further references: [2]
> [3]
>  [5] 
> Could you allocate two CVE ids for these? (I think two are needed
> for each of the issues)
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team
> P.S.: Kurt - regarding time, when this issue has been reported for
> the first time (thus which CVE-201*- id to allocate), it is
> necessary to find this it out yet.
> Upstream ticket [1] was reported on 2012-02-06 (which would suggest
> CVE-2012-* one to be allocated), but the rest of the links mention
> this issue has been known for longer time, thus please investigate
> yet. I wanted to Cc- the original ticket reporter 'hannibal218bc'
> on this request (he to clarify), but I doesn't seem to be able to
> find his proper email address / contact. Sorry for that.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla -


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.