FKIE_CVE-2010-3074

Vulnerability from fkie_nvd - Published: 2010-09-17 18:00 - Updated: 2026-04-29 01:13
Severity ?
Summary
SSL_Cipher.cpp in EncFS before 1.7.0 uses an improper combination of an AES cipher and a CBC cipher mode for encrypted filesystems, which allows local users to obtain sensitive information via a watermark attack.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/fulldisclosure/2010-08/0316.html
secalert@redhat.comhttp://bugs.gentoo.org/show_bug.cgi?id=335938
secalert@redhat.comhttp://code.google.com/p/encfs/source/detail?r=59
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047794.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047798.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047825.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
secalert@redhat.comhttp://secunia.com/advisories/41158Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/41478Vendor Advisory
secalert@redhat.comhttp://www.arg0.net/encfs
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/05/3
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/06/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2010/09/07/8
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2414Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=630460
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0316.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=335938
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/encfs/source/detail?r=59
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047794.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047798.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047825.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41158Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41478Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arg0.net/encfs
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/05/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/06/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/09/07/8
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2414Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=630460
Impacted products
Vendor Product Version
arg0 encfs *
arg0 encfs 1.4.0
arg0 encfs 1.4.1
arg0 encfs 1.4.1.1
arg0 encfs 1.4.2
arg0 encfs 1.5.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arg0:encfs:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B958CC56-A363-4A93-8AB7-4435FBB14373",
              "versionEndIncluding": "1.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arg0:encfs:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A30A73A-DB18-4D44-85C1-9F6967A3EE5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arg0:encfs:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F97913-1DF7-4F49-A86F-382D4C77C9C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arg0:encfs:1.4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8CA1DC0-1445-4F8C-8A0A-0131D2ACF54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arg0:encfs:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED7EF13-E6EA-4E31-A4A8-067819DA854A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:arg0:encfs:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "755C05A8-A1E0-46AF-A4A6-BF01469B1AA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SSL_Cipher.cpp in EncFS before 1.7.0 uses an improper combination of an AES cipher and a CBC cipher mode for encrypted filesystems, which allows local users to obtain sensitive information via a watermark attack."
    },
    {
      "lang": "es",
      "value": "SSL_Cipher.cpp en EncFS anterior a v1.7.0 utiliza una combinaci\u00f3n inadecuada de un sistema de cifrado AES y un modo de cifrado CBC para sistemas de archivos cifrados, lo cual permite a usuarios locales obtener informaci\u00f3n sensible mediante un ataque de marca de agua."
    }
  ],
  "id": "CVE-2010-3074",
  "lastModified": "2026-04-29T01:13:23.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-09-17T18:00:02.667",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0316.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=335938"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://code.google.com/p/encfs/source/detail?r=59"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047794.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047798.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047825.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41158"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41478"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.arg0.net/encfs"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/05/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/06/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/07/8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2414"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=630460"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0316.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=335938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/encfs/source/detail?r=59"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047794.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047798.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047825.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41158"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.arg0.net/encfs"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/05/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/06/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/09/07/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=630460"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…