4 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

03 Sep 2008 — TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability. TrueCrypt 5.0 almacena contraseñas de autenticación de pre-arranque en el búfer BIOS Keyboard y no limpia este búfer antes y después del uso, lo cual permite a usuar... • http://securityreason.com/securityalert/4203 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

28 Mar 2007 — TrueCrypt 4.3, when installed setuid root, allows local users to cause a denial of service (filesystem unavailability) or gain privileges by mounting a crafted TrueCrypt volume, as demonstrated using (1) /usr/bin or (2) another user's home directory, a different issue than CVE-2007-1589. TrueCrypt versión 4.3, cuando es instalado el root setuid, permite a los usuarios locales causar una denegación de servicio (indisponibilidad de sistema de archivos) o alcanzar privilegios mediante el montaje de un volumen ... • https://www.exploit-db.com/exploits/3664 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

21 Mar 2007 — TrueCrypt before 4.3, when set-euid mode is used on Linux, allows local users to cause a denial of service (filesystem unavailability) by dismounting a volume mounted by a different user. TrueCrypt versiones anteriores a 4.3, cuando se usa el modo Linux set-euid, permite a usuarios locales provocar una denegación de servicio (indisposición de sistema de ficheros) al desmontar un volumen montado por un usuario diferente. • http://secunia.com/advisories/24627 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

04 May 2006 — Untrusted search path vulnerability in Truecrypt 4.1, when running suid root on Linux, allows local users to execute arbitrary commands and gain privileges via a modified PATH environment variable that references a malicious mount command. • http://lists.immunitysec.com/pipermail/dailydave/2006-April/003152.html •