this post was submitted on 19 May 2023
20 points (100.0% liked)

Technology

37608 readers
215 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

The vulnerability affects the KeePass 2.X branch for Windows, and possibly for Linux and macOS. It has been fixed in the test versions of KeePass v2.54 – the official release is expected by July 2023. It’s unfortunate that the PoC tool is already publicly available and the release of the new version so far off, but the risk of CVE-2023-32784 being abused in the wild is likely to be pretty low, according to the researcher.

you are viewing a single comment's thread
view the rest of the comments
[–] Hirom@beehaw.org 6 points 1 year ago* (last edited 1 year ago) (1 children)

Even KeepassXC, which used Qt instead of .NET, aknowledge they can't garantee that things put the UI, such as the passphrase, won't appear in memory dump, even though they attempt to clear memory.

Any password manager with a UI is at risk, but KeePass should definitely do a better job at mitigating this risk.

[–] sxan@midwest.social 6 points 1 year ago (2 children)

I don't know which software, that can ever handle passwords, is immune to a hostile user capable of doing memory dumps on the target's memory space. Are you aware of one?

This threat model would require inter-process memory security at the OS level; you'd need to be running BSD, or some microkernel. You're not getting those protections on mainstream OSes, even with SE Linux, and every application that ever handles credentials in plain is at risk.

The point about Qt (and, TBH, probably about .Net) is how long the password remains in memory, and ao how big the attack vector window is, not whether or not it's completely immune to memory dump-level threats. 'Cause Windows and Linux are both susceptable to that.

Right?

load more comments (2 replies)