CVE-2008-3899

TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:truecrypt_foundation:truecrypt:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:50

Type Values Removed Values Added
References () http://securityreason.com/securityalert/4203 - () http://securityreason.com/securityalert/4203 -
References () http://www.ivizsecurity.com/preboot-patch.html - () http://www.ivizsecurity.com/preboot-patch.html -
References () http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf - () http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf -
References () http://www.securityfocus.com/archive/1/495805/100/0/threaded - () http://www.securityfocus.com/archive/1/495805/100/0/threaded -

Information

Published : 2008-09-03 14:12

Updated : 2024-11-21 00:50


NVD link : CVE-2008-3899

Mitre link : CVE-2008-3899

CVE.ORG link : CVE-2008-3899


JSON object : View

Products Affected

truecrypt_foundation

  • truecrypt
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor