Vulnerabilities > CVE-2014-2319 - Cryptographic Issues vulnerability in Powerarchiver

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
powerarchiver
CWE-310
nessus

Summary

The Encrypt Files feature in ConeXware PowerArchiver before 14.02.05 uses legacy ZIP encryption even if the AES 256-bit selection is chosen, which makes it easier for context-dependent attackers to obtain sensitive information via a known-plaintext attack.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyWindows
NASL idPOWERARCHIVER_WEAK_ENCRYPTION.NASL
descriptionThe remote host has PowerArchiver version 14.02.03 installed. It is, therefore, affected by a flaw with the encryption usage. A flaw exists in the application where the insecure PKZIP encryption method is used when a user attempts to encrypt files with AES 256-bit encryption. Note that Nessus has not attempted to exploit this issue, but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id73380
published2014-04-07
reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/73380
titlePowerArchiver 14.02.03 Incorrect PKZIP Encryption Usage
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(73380);
  script_version("1.3");
  script_cvs_date("Date: 2018/11/15 20:50:28");

  script_cve_id("CVE-2014-2319");
  script_bugtraq_id(66174);

  script_name(english:"PowerArchiver 14.02.03 Incorrect PKZIP Encryption Usage");
  script_summary(english:"Checks file version of PowerArchiver");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains an application that is affected by an
incorrect encryption usage vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote host has PowerArchiver version 14.02.03 installed. It is,
therefore, affected by a flaw with the encryption usage.

A flaw exists in the application where the insecure PKZIP encryption
method is used when a user attempts to encrypt files with AES 256-bit
encryption.

Note that Nessus has not attempted to exploit this issue, but has
instead relied only on the application's self-reported version number.");
  # https://www.powerarchiver.com/2014/03/12/powerarchiver-2013-14-02-05-released/
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a186deb6");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2014/Mar/79");
  script_set_attribute(attribute:"solution", value:"Upgrade to PowerArchiver 14.02.05 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/12");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/03/12");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:powerarchiver:powerarchiver");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");

  script_dependencies("powerarchiver_detect.nbin");
  script_require_keys("SMB/PowerArchiver/Installed");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

app = "PowerArchiver";
kb_base = "SMB/PowerArchiver/";

version = get_kb_item_or_exit(kb_base + "Version");
path = get_kb_item_or_exit(kb_base + "Path");

fix = "14.2.5.0";

# Only version 14.2.3.0 is vulnerable.
if (ver_compare(ver:version, fix:"14.2.3.0", strict:FALSE) != 0) audit(AUDIT_INST_PATH_NOT_VULN, app, version, path);

port = get_kb_item("SMB/transport");
if (!port) port = 445;

if (report_verbosity > 0)
{
  report =
    '\n  Path              : ' + path +
    '\n  Installed version : ' + version +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_warning(port:port, extra:report);
}
else security_warning(port);

Seebug

bulletinFamilyexploit
descriptionBugtraq ID:66174 CVE ID:CVE-2014-2319 ConeXware PowerArchiver是一款压缩工具。 如果在GUI中用户选择AES加密,ConeXware PowerArchiver会以不安全加密方法来创建文件。如选择"AES 256-bit"进行加密软件会使用PKZIP加密来代替。 0 ConeXware PowerArchiver 14.02.03 ConeXware PowerArchiver 14.02.05已经修复该漏洞,建议用户下载更新: http://www.powerarchiver.com
idSSV:61830
last seen2017-11-19
modified2014-03-18
published2014-03-18
reporterRoot
titleConeXware PowerArchiver弱加密漏洞