2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-3801" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-11-24T11:03:00.000" ,
"lastModified" : "2016-10-18T03:37:23.620" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "CounterPane PasswordSafe 1.x and 2.x allows local users to test possible encryption keys against a subset of the stored key data without performing the more expensive key derivation function (KDF) function, which reduces the search time in brute force attacks."
} ,
{
"lang" : "es" ,
"value" : "CounterPane PasswordSafe 1.x y 2.x permite a usuarios locales probar posibles claves de cifrado contra un subconjunto de los datos de claves almacenados sin realizar una funci\u00f3n de derivaci\u00f3n de clave (KDF) m\u00e1s cara, lo que reduce el tiempo de b\u00fasqueda en ataques de fuerza bruta."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:P/I:P/A:P" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 4.6
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C57891A-6C9F-4AAD-B7BF-07274EFD954C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.1a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EDBEF7D-899B-4E69-9CC8-6BF1DAFBCB81"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "703F94CC-3C4B-4277-8659-411EB8086B99"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2-dk_experimental:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A516722F-CA83-4EBA-A649-FCAB7DD06322"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2a:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4C35C7B7-27FB-4E37-B2F2-7FAF08B33804"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2b:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4FF8A0D-0F5C-4E91-A2FF-5E00F62D1969"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2b_ppc:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AB5B9726-442B-4CEF-BF11-FAD313CE9C12"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2c:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "828A6392-CD29-4E1E-B01A-DD23F1E92410"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2c.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C4671228-6585-49A9-B11B-68708F06EDDC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:1.9.2c.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "282EAC0D-536D-436B-98CE-655C76B725F6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17D7C5ED-0568-4DED-8815-D93CA9D997D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5FD8DB62-9A77-4182-A2D6-9E3949EA8603"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FEC5E3DE-46E2-45CB-B811-C976674A7FF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.03:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "20362768-75FA-46CE-BABA-FD9D47843AB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "74A79273-33B7-437C-8443-A82BC2380B1F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.05:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5DD1E7F2-150B-481D-ACC6-5B4EF746B4A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.06:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB5A0E88-E94E-4FDE-8D95-CE35527459C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.07:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "220ACCC1-E1C8-4A98-9E95-1EC6F3D692B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.08:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ACC5F204-D66C-4563-8FDB-FF504057D69D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.09:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C629B087-FDE5-4FB4-9533-941CAFA1D244"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "890A2AFE-E3CB-4BCB-96C2-DF2EC6819763"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "316B0240-3E68-4BC6-9E4F-3115A8A73B0A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D6FABCB0-EFA9-4D3C-BE63-0A9C247ADCAC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB7E941B-3D62-4FC5-8604-F027BA57E4CF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:counterpane:passwordsafe:2.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B6655E78-5643-45E0-8E09-F2BB0AA748D7"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=113217074200452&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securityreason.com/securityalert/190" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/21244" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/bid/15455" ,
"source" : "cve@mitre.org"
}
]
}