CVE-2007-3528
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/07/2007
Last modified:
09/04/2025
Description
The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dar:dar:*:*:*:*:*:*:*:* | 2.3.3 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335
- http://osvdb.org/38189
- http://osvdb.org/38190
- http://secunia.com/advisories/25953
- http://www.securityfocus.com/bid/24930
- https://sourceforge.net/forum/forum.php?forum_id=711619
- https://sourceforge.net/forum/forum.php?forum_id=711620
- https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425335
- http://osvdb.org/38189
- http://osvdb.org/38190
- http://secunia.com/advisories/25953
- http://www.securityfocus.com/bid/24930
- https://sourceforge.net/forum/forum.php?forum_id=711619
- https://sourceforge.net/forum/forum.php?forum_id=711620
- https://sourceforge.net/tracker/index.php?func=detail&aid=1730439&group_id=65612&atid=511612