SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   eCryptfs Vendors:   ecryptfs.sourceforge.net
eCryptfs Writes the Mount Passphrase to Log Files
SecurityTracker Alert ID:  1022347
SecurityTracker URL:  http://securitytracker.com/id/1022347
CVE Reference:   CVE-2009-1296   (Links to External Site)
Date:  Jun 9 2009
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in eCryptfs. A local user may be able to obtain the mount passphrase.

When an eCryptfs home directory is selected during installation, the mount passphrase is written to the installation log files [which are readable only by the root user].

Ubuntu is affected. Other distributions may also be affected.

Chris Jones reported this vulnerability.

Impact:   A local user with root privileges can obtain the mount password.
Solution:   The vendor has issued a fix, available at:

http://bazaar.launchpad.net/~ecryptfs/ecryptfs/ecryptfs-utils/revision/403

A fix is also available for Ubuntu Linux.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-783-1

Cause:   Access control error
Underlying OS:   Linux (Any)

Message History:   None.


 Source Message Contents

Date:  Tue, 9 Jun 2009 00:50:32 -0400
Subject:  eCryptfs


Ubuntu wrote:

Chris Jones discovered that the eCryptfs support utilities would
report the mount passphrase into installation logs when an eCryptfs
home directory was selected during Ubuntu installation.  The logs are
only readable by the root user, but this still left the mount passphrase
unencrypted on disk, potentially leading to a loss of privacy.

CVE-2009-1296
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC