Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 540064 - <sys-fs/ecryptfs-utils-104: key wrapping help to crack user password (CVE-2014-9687)
Summary: <sys-fs/ecryptfs-utils-104: key wrapping help to crack user password (CVE-201...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-02-14 15:51 UTC by Agostino Sarubbo
Modified: 2016-05-30 03:54 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-02-14 15:51:44 UTC
From ${URL} :

I have noticed that ecryptfs-utils is the default program used by the
Ubuntu distributions for home folder encryption since version 10.04.
In this case, a wrapping key is generated from the user password
using the hash function SHA-512 applied 65536 times. By default, the
wrapping key is hashed with the default fixed salt
(0x0011223344556677) and stored in the a file.
This was already noticed in bug :
https://bugs.launchpad.net/ecryptfs/+bug/906550
For  Ubuntu installations time-memory trade-off (rainbow tables, etc.)
can apply, as well as bulk dictionary attacks to crack user passwords
of Ubuntu installations when the home folder encryption is activated.
I am currently working to correct this weakness.



@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2015-06-17 17:39:06 UTC
CVE-2014-9687 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9687):
  eCryptfs 104 and earlier uses a default salt to encrypt the mount
  passphrase, which makes it easier for attackers to obtain user passwords via
  a brute force attack.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-03-29 08:42:46 UTC
@maintainer(s), please cleanup vulnerable version.  Thank you.
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-05-30 03:54:35 UTC
commit 6a91f410dd9e57237c472fd392235eb2063ef4d9