Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


KeepassX 0.43 Security Flaws
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

KeepassX 0.43 Security Flaws

GM2015GM2015 Member
edited December 2015 in General

Debian 8 packs keepassx 0.43 via apt, so you might be interested.

apt-cache policy keepassx
keepassx:
  Installed: (none)
  Candidate: 0.4.3+dfsg-0.1
  Version table:
     0.4.3+dfsg-0.1 0
        500 http://ftp.uk.debian.org/debian/ jessie/main i386 Packages

https://www.keepassx.org/news/2015/12/551

Two security flaws have been discovered in KeePassX 0.4.3.
Version 2.0 has a different codebase and is not affected.

CVE-2015-8359: DLL Preloading vulnerability on Windows
The version of Qt bundled with KeePassX 0.4.3 is vulnerable to a DDL preloading attack.
This vulnerability only affects KeePassX on Windows.
If successfully exploited, arbitrary code can be executed in the context of KeePassX.
KeePassX 0.4.4 ships with Qt 4.8.7 and employs additional hardening measures.
Thanks to Trenton Ivey from SecureWorks for reporting this vulnerability to us.
CVE-2015-8378: Canceling XML export function creates export as “.xml” file
When canceling the “Export to > KeePassX XML file” function the cleartext passwords were still exported.
In this case the password database was exported as the file “.xml” in the current working directory (often $HOME or the directory of the database).
Originally reported as Debian bug #791858

KeePassX 0.4.4 fixes both vulnerabilities.
It is available as a source tarball and Windows / Mac OS X binaries: Download
The OS X bundle contains only a 64bit binary (compared to 0.4.3 which shipped as i386 and powerpc).
The fix for CVE-2015-8378 is also available as a patch: CVE-2015-8378.patch

We will still provide security support for the 0.4 series for some time but please consider updating to version 2.0 instead.

https://www.keepassx.org/news/2015/12/551

WTF is keepassx
  1. WTF is keepassx39 votes
    1. I use it.
      35.90%
    2. I don't use it.
      30.77%
    3. I'd use it, but prefer paying instead.
        0.00%
    4. I've got to buy some servers tonight, so shut up.
        0.00%
    5. Hmpf, running out of popcorn.
        0.00%
    6. Got to shag that club-foot brunette down at Walmart.
        2.56%
    7. Server porn arriving from amazon. BRB.
        2.56%
    8. 8th sense.
        0.00%
    9. Non sense.
        2.56%
    10. 10 commandment of password management.
        7.69%
    11. One more for RM_, in case he wants to vote on something else not listed.
      17.95%

Comments

  • KuJoeKuJoe Member, Host Rep

    I don't know why they bother maintaining two versions of the same product. I used to use the 0.x version then switched to 2.x because it offers more features and looked like it had better security options all around.

    Thanked by 2GM2015 mpkossen
  • Well, I think they worry about linux distros' outdated package managers.

    KuJoe said: I don't know why they bother maintaining two versions of the same product. I used to use the 0.x version then switched to 2.x because it offers more features and looked like it had better security options all around.

  • People are really conservative with their votes.

  • NexHostNexHost Member
    edited December 2015

    Nice Poll!

    Should allow multi vote :D

    Thanked by 1GM2015
  • nice to see @rm_ got his votes.

    NexHost said: Nice Poll!

  • joepie91joepie91 Member, Patron Provider

    Second one is pretty bad, but unfortunately not uncommon for code from, shall we say... "C and C++ land". Lots of questionably structured code like that floating around. Unfortunately one such issue also existed in one of the KeePassX 2.x alphas, where it would not disable the "Copy Password" button when locking a database.

    Thanked by 1GM2015
Sign In or Register to comment.