Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 30 Nov 2015 17:04:22 -0500 (EST)
From: cve-assign@...re.org
To: corsac@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, dev@...passx.org, siretart@...ware.de
Subject: Re: CVE request for keepassx password database export

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> it seems that keepassx 0.4.3 export function are a bit buggy. Starting an
> export (using File / Export to / KeepassX XML file) and cancelling it leads to
> KeepassX saving a cleartext XML file in ~/.xml without any warning.
> 
> This was reported privately to the Debian security team today, but it was
> actually reported publicly earlier in the Debian BTS. Unfortunately the
> maintainer didn't acknowledge the bug or forwarded it upstream, apparently.
> 
> It's not a terrible bug per se because leaking a user password file on purpose
> would still require a lot of social engineering skills, but it still look like
> it should get a CVE (an user explicitly cancelling the export surely doesn't
> expect its passwords to be there in a hidden file.

> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=791858

>> canceling export operation creates cleartext copy of all of the user's
>> KeePassX password database entries

>> with Debian's default umask, the file is even world-readable in 
>> multiuser machines

Use CVE-2015-8378.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=kZt7
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.