Vulnerabilities > CVE-2013-7252 - Cryptographic Issues vulnerability in KDE Applications 14.11.3

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
kde
CWE-310
nessus

Summary

kwalletd in KWallet before KDE Applications 14.12.0 uses Blowfish with ECB mode instead of CBC mode when encrypting the password store, which makes it easier for attackers to guess passwords via a codebook attack.

Vulnerable Configurations

Part Description Count
Application
Kde
1

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-0569.NASL
    descriptionPull in upstream fixes for: CVE-2013-7252 kwallet: crypto misuse, and kio_sftp corruption Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-01-15
    plugin id80534
    published2015-01-15
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80534
    titleFedora 21 : kde-runtime-4.14.3-3.fc21 (2015-0569)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_7A8A74D19C3411E4A40B5453ED2E2B49.NASL
    descriptionValentin Rusu reports : Until KDE Applications 14.12.0, kwalletd incorrectly handled CBC encryption blocks when encrypting secrets in kwl files. The secrets were still encrypted, but the result binary data corresponded to an ECB encrypted block instead of CBC. The ECB encryption algorithm, even if it
    last seen2020-06-01
    modified2020-06-02
    plugin id80537
    published2015-01-15
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80537
    titleFreeBSD : kde-runtime -- incorrect CBC encryption handling (7a8a74d1-9c34-11e4-a40b-5453ed2e2b49)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-0564.NASL
    descriptionPull in upstream fixes for: CVE-2013-7252 kwallet: crypto misuse, and kio_sftp corruption Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-01-26
    plugin id80974
    published2015-01-26
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/80974
    titleFedora 20 : kde-runtime-4.14.3-3.fc20 (2015-0564)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_KDE4-L10N-150305.NASL
    descriptionkdebase4-runtime has been updated to fix one security issue : - Added gpg based encryption support to kwallet. (bnc#857200). (CVE-2013-7252)
    last seen2020-06-01
    modified2020-06-02
    plugin id81909
    published2015-03-18
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81909
    titleSuSE 11.3 Security Update : kdebase4-runtime (SAT Patch Number 10404)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201606-19.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201606-19 (kwalletd: Information disclosure) Kwalletd in KWallet uses Blowfish with ECB mode instead of CBC mode when encrypting the password store. Impact : Local attackers, with access to the password store, could conduct a codebook attack in order to obtain confidential passwords. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id91864
    published2016-06-28
    reporterThis script is Copyright (C) 2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/91864
    titleGLSA-201606-19 : kwalletd: Information disclosure