CVE-2007-3528
Publication date 3 July 2007
Last updated 24 July 2024
Ubuntu priority
The blowfish mode in DAR before 2.3.4 uses weak Blowfish-CBC cryptography by (1) discarding random bits by the blowfish::make_ivec function in libdar/crypto.cpp that results in predictable and repeating IV values, and (2) direct use of a password for keying, which makes it easier for context-dependent attackers to decrypt files.
Status
Package | Ubuntu Release | Status |
---|---|---|
dar | 9.10 karmic |
Fixed 2.3.5-1
|
9.04 jaunty |
Fixed 2.3.5-1
|
|
8.10 intrepid |
Fixed 2.3.5-1
|
|
8.04 LTS hardy |
Fixed 2.3.5-1
|
|
7.10 gutsy |
Fixed 2.3.5-1
|
|
7.04 feisty | Ignored end of life, was needed | |
6.10 edgy | Ignored end of life, was needed | |
6.06 LTS dapper | Ignored end of life |