Vulnerabilities > CVE-2014-2319 - Cryptographic Issues vulnerability in Powerarchiver

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The Encrypt Files feature in ConeXware PowerArchiver before 14.02.05 uses legacy ZIP encryption even if the AES 256-bit selection is chosen, which makes it easier for context-dependent attackers to obtain sensitive information via a known-plaintext attack.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyWindows
NASL idPOWERARCHIVER_WEAK_ENCRYPTION.NASL
descriptionThe remote host has PowerArchiver version 14.02.03 installed. It is, therefore, affected by a flaw with the encryption usage. A flaw exists in the application where the insecure PKZIP encryption method is used when a user attempts to encrypt files with AES 256-bit encryption. Note that Nessus has not attempted to exploit this issue, but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id73380
published2014-04-07
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/73380
titlePowerArchiver 14.02.03 Incorrect PKZIP Encryption Usage
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(73380);
  script_version("1.3");
  script_cvs_date("Date: 2018/11/15 20:50:28");

  script_cve_id("CVE-2014-2319");
  script_bugtraq_id(66174);

  script_name(english:"PowerArchiver 14.02.03 Incorrect PKZIP Encryption Usage");
  script_summary(english:"Checks file version of PowerArchiver");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by an
incorrect encryption usage vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host has PowerArchiver version 14.02.03 installed. It is,
therefore, affected by a flaw with the encryption usage.

A flaw exists in the application where the insecure PKZIP encryption
method is used when a user attempts to encrypt files with AES 256-bit
encryption.

Note that Nessus has not attempted to exploit this issue, but has
instead relied only on the application's self-reported version number.");
  # https://www.powerarchiver.com/2014/03/12/powerarchiver-2013-14-02-05-released/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a186deb6");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2014/Mar/79");
  script_set_attribute(attribute:"solution", value:"Upgrade to PowerArchiver 14.02.05 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/03/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:powerarchiver:powerarchiver");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("powerarchiver_detect.nbin");
  script_require_keys("SMB/PowerArchiver/Installed");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

app = "PowerArchiver";
kb_base = "SMB/PowerArchiver/";

version = get_kb_item_or_exit(kb_base + "Version");
path = get_kb_item_or_exit(kb_base + "Path");

fix = "14.2.5.0";

# Only version 14.2.3.0 is vulnerable.
if (ver_compare(ver:version, fix:"14.2.3.0", strict:FALSE) != 0) audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);

port = get_kb_item("SMB/transport");
if (!port) port = 445;

if (report_verbosity > 0)
{
  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_warning(port:port, extra:report);
}
else security_warning(port);

Seebug

bulletinFamilyexploit
descriptionBugtraq ID:66174 CVE ID:CVE-2014-2319 ConeXware PowerArchiver是一款压缩工具。 如果在GUI中用户选择AES加密,ConeXware PowerArchiver会以不安全加密方法来创建文件。如选择"AES 256-bit"进行加密软件会使用PKZIP加密来代替。 0 ConeXware PowerArchiver 14.02.03 ConeXware PowerArchiver 14.02.05已经修复该漏洞,建议用户下载更新: http://www.powerarchiver.com
idSSV:61830
last seen2017-11-19
modified2014-03-18
published2014-03-18
reporterRoot
titleConeXware PowerArchiver弱加密漏洞