[arch-security] [ASA-201503-14] ecryptfs-utils: hard-coded passphrase salt

Levente Polyak anthraxx at archlinux.org
Tue Mar 17 16:42:49 UTC 2015


Arch Linux Security Advisory ASA-201503-14
==========================================

Severity: Low
Date    : 2015-03-17
CVE-ID  : CVE-2014-9687
Package : ecryptfs-utils
Type    : hard-coded passphrase salt
Remote  : No
Link    : https://wiki.archlinux.org/index.php/CVE

Summary
=======

The package ecryptfs-utils before version 106-1 is vulnerable to
hard-coded passphrase salt that may ease a brute-force attack.

Resolution
==========

Upgrade to 106-1.

# pacman -Syu "ecryptfs-utils>=106-1"

The problem has been fixed upstream in version 106.

If pam_ecryptfs is used a transparent migration from version 1 to
version 2 files is provided, otherwise a manual re-wrapping of the
passphrase file is mandatory.

Workaround
==========

None.

Description
===========

eCryptfs uses a default salt to encrypt the mount passphrase, which
makes it easier for attackers to obtain user passwords via a brute force
attack. By default, the wrapping key is hashed with the default fixed
salt (0x0011223344556677).

This update introduces the version 2 wrapped-passphrase file format. It
adds the ability to combine a randomly generated salt with the wrapping
password (typically, a user's login password) prior to performing key
strengthening. The version 2 file format is considered to be a
intermediate step in strengthening the wrapped-passphrase files of
existing encrypted home/private users.

If pam_ecryptfs is used a transparent migration from version 1 to
version 2 files is provided, otherwise a manual re-wrapping of the
passphrase file is mandatory.

Impact
======

An attacker could use this issue to discover the login password used to
protect the mount passphrase and gain unintended access to the encrypted
files with the help of bulk dictionary attacks and rainbow tables to
crack user passwords.

References
==========

http://www.openwall.com/lists/oss-security/2015/02/10/10
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9687
https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/839
https://bugs.archlinux.org/task/44157

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20150317/17768971/attachment.asc>


More information about the arch-security mailing list