8 results (0.004 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

The ProcessVolumeDeviceControlIrp function in Ntdriver.c in TrueCrypt 7.1a allows local users to bypass access restrictions and obtain sensitive information about arbitrary files via a (1) TC_IOCTL_OPEN_TEST or (2) TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG IOCTL call. La función ProcessVolumeDeviceControlIrp en Ntdriver.c en TrueCrypt 7.1a permite que usuarios locales omitan las restricciones de acceso y obtengan información sensible sobre archivos arbitrarios mediante una llamada (1) TC_IOCTL_OPEN_TEST o (2) TC_IOCTL_GET_SYSTEM_DRIVE_CONFIG IOCTL. • http://www.openwall.com/lists/oss-security/2014/04/17/7 https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Multiple integer overflows in TrueCrypt 7.1a allow local users to (1) obtain sensitive information via vectors involving a crafted item->OriginalLength value in the MainThreadProc function in EncryptedIoQueue.c or (2) cause a denial of service (memory consumption) via vectors involving large StartingOffset and Length values in the ProcessVolumeDeviceControlIrp function in Ntdriver.c. Múltiples desbordamientos de enteros en TrueCrypt 7.1a permiten que usuarios locales (1) obtengan información sensible mediante vectores relacionados con un valor item->OriginalLength manipulado en la función MainThreadProc en EncryptedIoQueue.c o (2) provoquen una denegación de servicio (consumo de memoria) mediante vectores relacionados con valores StartingOffset y Length grandes en la función ProcessVolumeDeviceControlIrp en Ntdriver.c. • http://www.openwall.com/lists/oss-security/2014/04/17/7 https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf • CWE-190: Integer Overflow or Wraparound CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

The (1) IsVolumeAccessibleByCurrentUser and (2) MountDevice methods in Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, do not check the impersonation level of impersonation tokens, which allows local users to impersonate a user at SecurityIdentify level and gain access to other users' mounted encrypted volumes. Los métodos (1) IsVolumeAccessibleByCurrentUser y (2) MountDevice en Ntdriver.c en TrueCrypt 7.0; VeraCrypt, en versiones anteriores a la 1.15; y CipherShed, cuando se ejecutan en Windows, no comprueban el nivel de suplantación de los tokens de suplantación, lo que permite que los usuarios locales suplanten a un usuario a nivel de SecurityIdentify y obtengan acceso a los volúmenes cifrados montados de otros usuarios. The Windows driver used by projects derived from Truecrypt 7 (verified in Veracrypt and CipherShed) are vulnerable to a local elevation of privilege attack by checking process of impersonation token which allow a user to inspect and potentially manipulate other users mounted encrypted volumes on the same machine. • http://packetstormsecurity.com/files/133877/Truecrypt-7-Privilege-Escalation.html http://www.openwall.com/lists/oss-security/2015/09/22/7 http://www.openwall.com/lists/oss-security/2015/09/24/3 https://code.google.com/p/google-security-research/issues/detail?id=537 https://veracrypt.codeplex.com/wikipage?title=Release%20Notes • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

The IsDriveLetterAvailable method in Driver/Ntdriver.c in TrueCrypt 7.0, VeraCrypt before 1.15, and CipherShed, when running on Windows, does not properly validate drive letter symbolic links, which allows local users to mount an encrypted volume over an existing drive letter and gain privileges via an entry in the /GLOBAL?? directory. El método IsDriveLetterAvailable en Driver/Ntdriver.c en TrueCrypt 7.0, Veracrypt en versiones anteriores a la 1.15 y CipherShed, cuando se ejecuta en Windows, no valida correctamente los enlaces simbólicos de las letras de las unidades de disco, lo que permite a los usuarios locales montar un volumen cifrado en una letra de unidad existente y obtener privilegios mediante una entrada en el directorio /GLOBAL??. The Windows driver used by projects derived from Truecrypt 7 (verified in Veracrypt and CipherShed) are vulnerable to a local elevation of privilege attack by abusing the drive letter symbolic link creation facilities to remap the main system drive. With the system drive remapped it's trivial to get a new process running under the local system account. • https://www.exploit-db.com/exploits/38403 http://packetstormsecurity.com/files/133878/Truecrypt-7-Derived-Code-Windows-Drive-Letter-Symbolic-Link-Creation-Privilege-Escalation.html http://www.openwall.com/lists/oss-security/2015/09/22/7 http://www.openwall.com/lists/oss-security/2015/09/24/3 https://code.google.com/p/google-security-research/issues/detail?id=538 https://veracrypt.codeplex.com/wikipage?title=Release%20Notes • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability. TrueCrypt 5.0 almacena contraseñas de autenticación de pre-arranque en el búfer BIOS Keyboard y no limpia este búfer antes y después del uso, lo cual permite a usuarios locales obtener información sensible leyendo las localizaciones de memoria física asociadas con este búfer. NOTA: el investigador menciona una respuesta de los vendedores negando la vulnerabilidad. • http://securityreason.com/securityalert/4203 http://www.ivizsecurity.com/preboot-patch.html http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf http://www.securityfocus.com/archive/1/495805/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •