Secunia Research has discovered a security issue in Bournal, which can be exploited by malicious, local users to disclose sensitive information.
The script uses e.g. the insecure "-K" command line parameter to pass the key to the ccrypt utilities, which can be exploited to obtain the key from the list of running processes.
Note: This may not affect recent Linux versions, but is confirmed for FreeBSD 8.0. Other systems may also be affected.
Solution: Fixed in version 1.4.1 by preventing the use of the script on FreeBSD systems. This may still affect other systems where users have access to the full command line of other user's processes, despite ccrypt disabling "echoing" on the terminal.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Bournal ccrypt Information Disclosure Security Issue
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.