8.6 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
70.7%
Sylvain Pelissier discovered that eCryptfs did not generate a random salt when
encrypting the mount passphrase with the login password. An attacker could use
this issue to discover the login password used to protect the mount passphrase
and gain unintended access to the encrypted files.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 14.10 | noarch | ecryptfs-utils | < 104-0ubuntu1.14.10.3 | UNKNOWN |
Ubuntu | 14.10 | noarch | ecryptfs-utils-dbg | < 104-0ubuntu1.14.10.3 | UNKNOWN |
Ubuntu | 14.10 | noarch | libecryptfs-dev | < 104-0ubuntu1.14.10.3 | UNKNOWN |
Ubuntu | 14.10 | noarch | libecryptfs0 | < 104-0ubuntu1.14.10.3 | UNKNOWN |
Ubuntu | 14.10 | noarch | python-ecryptfs | < 104-0ubuntu1.14.10.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | ecryptfs-utils | < 104-0ubuntu1.14.04.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | ecryptfs-utils-dbg | < 104-0ubuntu1.14.04.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libecryptfs-dev | < 104-0ubuntu1.14.04.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | libecryptfs0 | < 104-0ubuntu1.14.04.3 | UNKNOWN |
Ubuntu | 14.04 | noarch | python-ecryptfs | < 104-0ubuntu1.14.04.3 | UNKNOWN |