TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a...
5.9AI Score
0.0004EPSS
TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a...
6.5AI Score
0.0004EPSS
TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a...
5.9AI Score
0.0004EPSS
Cleartext password is not erased from BIOS data...
1.5AI Score
[IVIZ-08-003] TrueCrypt Security Model bypass exploiting wrong BIOS API usage
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [ iViZ Security Advisory 08-003 25/08/2008 ] iViZ Techno Solutions Pvt. Ltd. http://www.ivizsecurity.com Title: TrueCrypt Security Model bypass exploiting wrong BIOS...
-0.3AI Score
TrueCrypt <= 4.3 Local Privilege Escalation Exploit (CVE-2007-1738)
No description provided by...
6.5AI Score
0.0004EPSS
TrueCrypt <= 4.3 Local Privilege Escalation Exploit (CVE-2007-1738)
Exploit for unknown platform in category local...
6.8AI Score
TrueCrypt 4.3 - setuid Local Privilege Escalation
TrueCrypt 4.3 - setuid Local Privilege...
0.6AI Score
0.0004EPSS
6.6AI Score
EPSS
TrueCrypt Dismount Set-EUID本地拒绝服务漏洞
TrueCrypt是一款免费开源虚拟加密盘加密软件。 TrueCrypt存在设计错误,本地攻击者可以利用漏洞对应用程序进行拒绝服务攻击。 本地攻击者可以卸挂其他用户挂接的驱动盘,导致拒绝服务攻击。目前没有详细漏洞细节提供。 TrueCrypt TrueCrypt 4.2 TrueCrypt TrueCrypt 4.1 TrueCrypt TrueCrypt 4.0 TrueCrypt TrueCrypt 3.0 升级到最新程序:...
7.1AI Score
TrueCrypt 4.3, when installed setuid root, allows local users to cause a denial of service (filesystem unavailability) or gain privileges by mounting a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another user's home directory, a different issue than...
6.5AI Score
0.0004EPSS
TrueCrypt 4.3, when installed setuid root, allows local users to cause a denial of service (filesystem unavailability) or gain privileges by mounting a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another user's home directory, a different issue than...
6.2AI Score
0.0004EPSS
TrueCrypt 4.3, when installed setuid root, allows local users to cause a denial of service (filesystem unavailability) or gain privileges by mounting a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another user's home directory, a different issue than...
6.2AI Score
0.0004EPSS
TrueCrypt 4.3, when installed setuid root, allows local users to cause a denial of service (filesystem unavailability) or gain privileges by mounting a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another user's home directory, a different issue than...
6.2AI Score
0.0004EPSS
Denial of Service Vulnerabilities in TrueCrypt 4.3 Linux (re. bid 23180)
TrueCrypt 4.3 for Linux from http://www.truecrypt.org/ It seems to be possible to perform various denial of service attacks on a Linux computer running TrueCrypt in set-uid root mode, or possible introduce evil binaries into normally trusted locations. I tested this on the latest version, 4.3,...
-0.4AI Score
Truecrypt privilege escalation
In suid mode it's possible for user to mount crypted filesystem to any...
2.7AI Score
0.0004EPSS
TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different...
6AI Score
0.0004EPSS
TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different...
6AI Score
0.0004EPSS
TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different...
6.3AI Score
0.0004EPSS
TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different...
6AI Score
0.0004EPSS
Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount...
7.4AI Score
0.001EPSS
Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount...
7.8AI Score
0.001EPSS
Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount...
7.4AI Score
0.001EPSS
Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount...
7.4AI Score
0.001EPSS
Multiple Vendor BIOS - Keyboard Buffer Password Persistence (1)
Multiple Vendor BIOS - Keyboard Buffer Password Persistence...
0.3AI Score
Multiple Vendor BIOS - Keyboard Buffer Password Persistence (2)
Multiple Vendor BIOS - Keyboard Buffer Password Persistence...
0.3AI Score
7.4AI Score
EPSS
7.4AI Score
EPSS