TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability.
References
Configurations
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/4203 - | |
References | () http://www.ivizsecurity.com/preboot-patch.html - | |
References | () http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf - | |
References | () http://www.securityfocus.com/archive/1/495805/100/0/threaded - |
Information
Published : 2008-09-03 14:12
Updated : 2024-11-21 00:50
NVD link : CVE-2008-3899
Mitre link : CVE-2008-3899
CVE.ORG link : CVE-2008-3899
JSON object : View
Products Affected
truecrypt_foundation
- truecrypt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor