Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Your KeePass Master Password may be at risk, but a fix is coming
#1
Exclamation 
Quote:[Image: security.jpg]

A recently disclosed vulnerability in the KeePass password manager may be exploited to retrieve the master password. The vulnerability, CVE-2023-32784. indicates that the master password may be recovered from system memory dumps, even if the system is not running or locked.

Dominik Reichl, the developer of KeePass, will release a patch in the upcoming KeePass 2.54 release, which is scheduled for a release in the coming 2 months.

The security researcher who discovered the vulnerability has published a proof of concept on GitHub. The tool, KeePass 2.X Master Password Dumper, analyzes memory dumps, for instance pagefile.sys, hiberfil.sys, or the KeePass process dump to return the master password in clear text. To be precise, the vulnerability may return all characters of the master password except for the first one. It is trivial, however, to run tests to find the single missing character.

[Image: keepass.png]

The researcher goes on to explain that the issue is caused by SecureTextBoxEx, which causes leftover strings.

While the vulnerability may allow threat actors to retrieve the master password of the password manager, but it seems unlikely that it will be exploited on scale.

A likely scenario is a forensic investigation of a computer, as this may return the master password of the password manager. One of the best protections against this is to use full disk encryption and a strong password. Windows users may use the open source encryption software Vera Crypt for that. A password is required during system start to decrypt the system drive and boot the operating system.

The researcher suggests that users of KeePass may also delete hibernation, pagefiles and swapfiles regularly, but it is only a temporary recourse. Changing the master password helps as well, but also only temporarily.

KeePass 2.54 will address the issue. While it may be a month or two away, it is possible that it will be released faster, if reporting about the vulnerability is picking up pace.

Dominik Reichl describes the fix on the project's Sourceforge discussion forum. The updated version " calls Windows API functions for getting/setting the text of the text box directly, in order to avoid the creation of managed strings". This takes care of most of the leaks. To address the remaining ones, KeePass 2.54 will create dummy fragments in process memory.

The researcher tested the fix and confirmed that it is no longer possible to reproduce the attack on the fixed version. While there is a development build available that includes the fix, it is not recommended to run it, as it is beta software.

Certain KeePass forks, like KeePassXC, are not affected by the issue.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
A matter of triangulation
In search of the Tri...harlan4096 — 17:20
GFYI [Official] O&O DiskImage 18 Profes...
Thanks so much for t...tarekma7 — 14:21
Opera 99.0.4788.47
Opera 99.0.4788.47...harlan4096 — 10:32
A matter of triangulation
Kaspersky uncovers o...harlan4096 — 10:27
Internet Download Manager 6.41 Build 12
Changes in 6.41 Bu...harlan4096 — 08:40

[-]
Birthdays
Today's Birthdays
avatar (47)eapedDow
avatar (44)Carlosskake
Upcoming Birthdays
avatar (45)BrantgoG
avatar (39)tapedDow
avatar (46)rapedDow
avatar (41)Johnsonsyday
avatar (46)Groktus
avatar (38)efodo
avatar (36)Tedscolo
avatar (43)brakasig
avatar (42)JamesReshy
avatar (44)Francisemefe
avatar (37)leoniDup
avatar (36)Patrizaancem
avatar (48)smudloquask
avatar (43)benchJem
avatar (36)biobdam
avatar (39)zacforat
avatar (44)NemrokReks
avatar (47)Jasoncedia
avatar (35)Barrackleve
avatar (37)Julioagopy
avatar (47)aolaupitt2558
avatar (45)vadimTob
avatar (35)leannauu4
avatar (37)storoBox
avatar (45)kinotHeemn
avatar (36)Ceballos1976
avatar (37)efynu
avatar (29)horancos

[-]
Online Staff
There are no staff members currently online.

>