Password Safe - Lock Password Database Configuration Not Enforced

Risk: Low
Local: Yes
Remote: No
CWE: CWE-Other

CVSS Base Score: 2.1/10
Impact Subscore: 2.9/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec Vulnerability Research Security Advisory Advisory ID: SYMSA-2006-008 Advisory Title: Password Safe - Lock Password Database Configuration Not Enforced Author: J.R. Wikes Release Date: 07-24-2006 Application: Password Safe 2.11, 2.16, 3.0BETA1 Platform: Windows (95/98/NT/2000/XP) Severity: Locally exploitable Vendor status: Verified by vendor. Upgrade available CVE Number: CVE-2006-3675 Reference: Overview: Password Safe is open source software which allows users to create a secured and encrypted master password list. This list is controlled and accessed through the Password Safe software resident on a user?s workstation. One of the security features of the software allows users to configure the password database to lock upon the workstation being locked or after a set period of inactivity. It was determined that this locking feature is not enforced on either of these events when certain dialogue windows are open in the software. More information on Password Safe can be obtained at Details: Password Safe can be configured to lock the password database when the workstation is locked or after a set period of idle time to prevent unauthorized access to the database contents. When the following dialogue windows are left open in the application the database will not lock on either of these preconfigured events. File > New Database File > Open Database File > Save As File > Export To File > Import From File > Merge Database Edit > Add Entry Edit > Edit/View Entry Manage > Change Safe Combination Manage > Make Backup Manage > Restore from Backup Help > About Password Safe By not locking the password database as configured, its contents may be at risk of compromise by an attacker with access to the workstation. Vendor Response: The above vulnerability was addressed for the affected platforms in Password Safe 3.01. Customers can download the latest version of Password Safe from the following website: If there are any further questions about this statement, please contact ronys (at) users.sourceforge (dot) net. [email concealed] Recommendation: Follow your organization's testing procedures before applying patches or workarounds. Customers should upgrade to Password Safe 3.01, or higher as soon as possible. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (, which standardizes names for security problems. CVE-2006-3675 - -------Symantec Vulnerability Research Advisory Information------- For questions about this advisory, or to report an error: research (at) symantec (dot) com [email concealed] For details on Symantec's Vulnerability Reporting Policy: Symantec Vulnerability Research Advisory Archive: Symantec Vulnerability Research GPG Key: _GPG.asc - -------------Symantec Product Advisory Information------------- To Report a Security Vulnerability in a Symantec Product: secure (at) symantec (dot) com [email concealed] For general information on Symantec's Product Vulnerability reporting and response: Symantec Product Advisory Archive: Symantec Product Advisory PGP Key: sc - --------------------------------------------------------------- Copyright (c) 2006 by Symantec Corp Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Consulting Services. Reprinting the whole or part of this alert in any medium other than electronically requires permission from cs_advisories (at) symantec (dot) com. [email concealed] Disclaimer The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. Symantec, Symantec products, and Symantec Consulting Services are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (MingW32) iD8DBQFEwSEmuk7IIFI45IARAjj0AKDczBDqi2cHgO4IoiGrisEy0Hu4nwCeMuyh CMZesdTEK1BizW6euMxJVHk= =iRbL -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top