Vulnerabilities > CVE-2007-3528 - Unspecified vulnerability in DAR
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN dar
nessus
Summary
The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.
Nessus
NASL family | Fedora Local Security Checks |
NASL id | FEDORA_2007-0904.NASL |
description | Adding CVE reference Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 27685 |
published | 2007-11-06 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/27685 |
title | Fedora 7 : dar-2.3.4-1.fc7 (2007-0904) |
code |
|
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335
- http://osvdb.org/38189
- http://osvdb.org/38189
- http://osvdb.org/38190
- http://osvdb.org/38190
- http://secunia.com/advisories/25953
- http://secunia.com/advisories/25953
- http://www.securityfocus.com/bid/24930
- http://www.securityfocus.com/bid/24930
- https://sourceforge.net/forum/forum.php?forum_id=711619
- https://sourceforge.net/forum/forum.php?forum_id=711619
- https://sourceforge.net/forum/forum.php?forum_id=711620
- https://sourceforge.net/forum/forum.php?forum_id=711620
- https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612
- https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612