The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.
References
Link | Resource |
---|---|
https://bogner.sh/2016/03/mitm-attack-against-keepass-2s-update-check/ | Exploit Technical Description |
https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html | Third Party Advisory |
https://sourceforge.net/p/keepass/discussion/329220/thread/e430cc12/ | Patch Product |
https://bogner.sh/2016/03/mitm-attack-against-keepass-2s-update-check/ | Exploit Technical Description |
https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html | Third Party Advisory |
https://sourceforge.net/p/keepass/discussion/329220/thread/e430cc12/ | Patch Product |
Configurations
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://bogner.sh/2016/03/mitm-attack-against-keepass-2s-update-check/ - Exploit, Technical Description | |
References | () https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html - Third Party Advisory | |
References | () https://sourceforge.net/p/keepass/discussion/329220/thread/e430cc12/ - Patch, Product |
Information
Published : 2017-01-23 21:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-5119
Mitre link : CVE-2016-5119
CVE.ORG link : CVE-2016-5119
JSON object : View
Products Affected
keepass
- keepass
CWE
CWE-20
Improper Input Validation