Vulnerabilities > CVE-2013-7252 - Cryptographic Issues vulnerability in KDE Applications 14.11.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
kwalletd in KWallet before KDE Applications 14.12.0 uses Blowfish with ECB mode instead of CBC mode when encrypting the password store, which makes it easier for attackers to guess passwords via a codebook attack.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2015-0569.NASL description Pull in upstream fixes for: CVE-2013-7252 kwallet: crypto misuse, and kio_sftp corruption Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-01-15 plugin id 80534 published 2015-01-15 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/80534 title Fedora 21 : kde-runtime-4.14.3-3.fc21 (2015-0569) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_7A8A74D19C3411E4A40B5453ED2E2B49.NASL description Valentin Rusu reports : Until KDE Applications 14.12.0, kwalletd incorrectly handled CBC encryption blocks when encrypting secrets in kwl files. The secrets were still encrypted, but the result binary data corresponded to an ECB encrypted block instead of CBC. The ECB encryption algorithm, even if it last seen 2020-06-01 modified 2020-06-02 plugin id 80537 published 2015-01-15 reporter This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/80537 title FreeBSD : kde-runtime -- incorrect CBC encryption handling (7a8a74d1-9c34-11e4-a40b-5453ed2e2b49) NASL family Fedora Local Security Checks NASL id FEDORA_2015-0564.NASL description Pull in upstream fixes for: CVE-2013-7252 kwallet: crypto misuse, and kio_sftp corruption Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-01-26 plugin id 80974 published 2015-01-26 reporter This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/80974 title Fedora 20 : kde-runtime-4.14.3-3.fc20 (2015-0564) NASL family SuSE Local Security Checks NASL id SUSE_11_KDE4-L10N-150305.NASL description kdebase4-runtime has been updated to fix one security issue : - Added gpg based encryption support to kwallet. (bnc#857200). (CVE-2013-7252) last seen 2020-06-01 modified 2020-06-02 plugin id 81909 published 2015-03-18 reporter This script is Copyright (C) 2015 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81909 title SuSE 11.3 Security Update : kdebase4-runtime (SAT Patch Number 10404) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201606-19.NASL description The remote host is affected by the vulnerability described in GLSA-201606-19 (kwalletd: Information disclosure) Kwalletd in KWallet uses Blowfish with ECB mode instead of CBC mode when encrypting the password store. Impact : Local attackers, with access to the password store, could conduct a codebook attack in order to obtain confidential passwords. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 91864 published 2016-06-28 reporter This script is Copyright (C) 2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/91864 title GLSA-201606-19 : kwalletd: Information disclosure
References
- http://gaganpreet.in/blog/2013/07/24/kwallet-security-analysis/
- http://www.openwall.com/lists/oss-security/2014/01/02/3
- http://www.openwall.com/lists/oss-security/2015/01/09/7
- http://www.securityfocus.com/bid/67716
- https://bugzilla.redhat.com/show_bug.cgi?id=1048168
- https://security.gentoo.org/glsa/201606-19
- https://www.kde.org/info/security/advisory-20150109-1.txt