Vulnerability CVE-2008-3899


Published: 2008-09-03   Modified: 2012-02-12

Description:
TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability.

See advisories in our WLB2 database:
Topic
Author
Date
Low
TrueCrypt Security Model bypass exploiting wrong BIOS API usage
iViZ
04.09.2008

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Truecrypt foundation -> Truecrypt 

 References:
http://securityreason.com/securityalert/4203
http://www.ivizsecurity.com/preboot-patch.html
http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
http://www.securityfocus.com/archive/1/495805/100/0/threaded

Copyright 2024, cxsecurity.com

 

Back to Top