CVE-2014-9687

eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:21

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html - () http://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html -
References () http://www.openwall.com/lists/oss-security/2015/02/10/16 - () http://www.openwall.com/lists/oss-security/2015/02/10/16 -
References () http://www.openwall.com/lists/oss-security/2015/02/17/7 - () http://www.openwall.com/lists/oss-security/2015/02/17/7 -
References () http://www.openwall.com/lists/oss-security/2015/02/28/3 - () http://www.openwall.com/lists/oss-security/2015/02/28/3 -
References () http://www.ubuntu.com/usn/USN-2524-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-2524-1 - Vendor Advisory
References () https://bugs.launchpad.net/ecryptfs/+bug/906550 - Exploit () https://bugs.launchpad.net/ecryptfs/+bug/906550 - Exploit

Information

Published : 2015-03-16 14:59

Updated : 2024-11-21 02:21


NVD link : CVE-2014-9687

Mitre link : CVE-2014-9687

CVE.ORG link : CVE-2014-9687


JSON object : View

Products Affected

ecryptfs

  • ecryptfs-utils
CWE
CWE-255

Credentials Management Errors