Lucene search

K
ubuntuUbuntuUSN-2524-1
HistoryMar 11, 2015 - 12:00 a.m.

eCryptfs vulnerability

2015-03-1100:00:00
ubuntu.com
37

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

8.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.8%

Releases

  • Ubuntu 14.10
  • Ubuntu 14.04 ESM
  • Ubuntu 12.04
  • Ubuntu 10.04

Packages

  • ecryptfs-utils - eCryptfs cryptographic filesystem utilities

Details

Sylvain Pelissier discovered that eCryptfs did not generate a random salt when
encrypting the mount passphrase with the login password. An attacker could use
this issue to discover the login password used to protect the mount passphrase
and gain unintended access to the encrypted files.

OSVersionArchitecturePackageVersionFilename
Ubuntu14.10noarchecryptfs-utils< 104-0ubuntu1.14.10.3UNKNOWN
Ubuntu14.10noarchecryptfs-utils-dbg< 104-0ubuntu1.14.10.3UNKNOWN
Ubuntu14.10noarchlibecryptfs-dev< 104-0ubuntu1.14.10.3UNKNOWN
Ubuntu14.10noarchlibecryptfs0< 104-0ubuntu1.14.10.3UNKNOWN
Ubuntu14.10noarchpython-ecryptfs< 104-0ubuntu1.14.10.3UNKNOWN
Ubuntu14.04noarchecryptfs-utils< 104-0ubuntu1.14.04.3UNKNOWN
Ubuntu14.04noarchecryptfs-utils-dbg< 104-0ubuntu1.14.04.3UNKNOWN
Ubuntu14.04noarchlibecryptfs-dev< 104-0ubuntu1.14.04.3UNKNOWN
Ubuntu14.04noarchlibecryptfs0< 104-0ubuntu1.14.04.3UNKNOWN
Ubuntu14.04noarchpython-ecryptfs< 104-0ubuntu1.14.04.3UNKNOWN
Rows per page:
1-10 of 181

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

8.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.8%