Vulnerability Description
TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer. NOTE: the researcher mentions a response from the vendor denying the vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Truecrypt Foundation | Truecrypt | 5.0 |
Related Weaknesses (CWE)
References
- http://securityreason.com/securityalert/4203
- http://www.ivizsecurity.com/preboot-patch.html
- http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
- http://www.securityfocus.com/archive/1/495805/100/0/threaded
- http://securityreason.com/securityalert/4203
- http://www.ivizsecurity.com/preboot-patch.html
- http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
- http://www.securityfocus.com/archive/1/495805/100/0/threaded
FAQ
What is CVE-2008-3899?
CVE-2008-3899 is a vulnerability with a CVSS score of 2.1 (LOW). TrueCrypt 5.0 stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by read...
How severe is CVE-2008-3899?
CVE-2008-3899 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3899?
Check the references section above for vendor advisories and patch information. Affected products include: Truecrypt Foundation Truecrypt.