CVE-2007-3528

Publication date 3 July 2007

Last updated 24 July 2024


Ubuntu priority

The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
dar 9.10 karmic
Fixed 2.3.5-1
9.04 jaunty
Fixed 2.3.5-1
8.10 intrepid
Fixed 2.3.5-1
8.04 LTS hardy
Fixed 2.3.5-1
7.10 gutsy
Fixed 2.3.5-1
7.04 feisty Ignored end of life, was needed
6.10 edgy Ignored end of life, was needed
6.06 LTS dapper Ignored end of life