Vulnerability CVE-2016-5119


Published: 2017-01-23

Description:
The automatic update feature in KeePass 2.33 and earlier allows man-in-the-middle attackers to execute arbitrary code by spoofing the version check response and supplying a crafted update.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
KeePass 2 Man-In-The-Middle
Florian Bogner
02.06.2016

Vendor: Keepass
Product: Keepass 
Version: 2.33;

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
https://bogner.sh/2016/03/mitm-attack-against-keepass-2s-update-check/
https://packetstormsecurity.com/files/137274/KeePass-2-Man-In-The-Middle.html
https://sourceforge.net/p/keepass/discussion/329220/thread/e430cc12/

Related CVE
CVE-2017-1000066
The entry details view function in KeePass version 1.32 inadvertently decrypts certain database entries into memory, which may result in the disclosure of sensitive information.
CVE-2010-5200
Untrusted search path vulnerability in KeePass Password Safe before 1.18 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .kdb file. NOTE: some of these det...
CVE-2010-5196
Untrusted search path vulnerability in KeePass Password Safe before 2.13 allows local users to gain privileges via a Trojan horse DwmApi.dll file in the current working directory, as demonstrated by a directory that contains a .kdbx file. NOTE: some...

Copyright 2019, cxsecurity.com

 

Back to Top