Public bug reported:

Description
===========
It was discovered that QtPass before 1.2.1, when using the built-in password 
generator, generates possibly predictable and enumerable passwords. This only 
applies to the QtPass GUI. The generator used libc's random(), seeded with 
srand(msecs), where msecs is not the msecs since 1970 (not that that'd be 
secure anyway), but rather the msecs since the last second. This means there 
are only 1000 different sequences of generated passwords.

The problem has been fixed upstream in version 1.2.1. (planned to be
shipped with ubuntu 18.04)

Impact
======
Passwords generated using QtPass can potentially be recovered by an attacker 
due to the use of a non-cryptographically secure random number generator with a 
predictable seed. It is recommend to change all passwords created by QtPass.

References
==========
http://www.openwall.com/lists/oss-security/2018/01/05/5
https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html
https://github.com/IJHack/QtPass/issues/338 
https://github.com/IJHack/QtPass/commit/e7bd0651335e1bf4f01512d1555fe0b960ff1787
https://security.archlinux.org/CVE-2017-18021

** Affects: qtpass (Ubuntu)
     Importance: Undecided
         Status: New

** Description changed:

- Description 
- =========== 
- It was discovered that QtPass before 1.2.1, when using the built-in password 
generator, generates possibly predictable and enumerable passwords. This only 
applies to the QtPass GUI. The generator used libc's random(), seeded with 
srand(msecs), where msecs is not the msecs since 1970 (not that that'd be 
secure anyway), but rather the msecs since the last second. This means there 
are only 1000 different sequences of generated passwords. 
+ Description
+ ===========
+ It was discovered that QtPass before 1.2.1, when using the built-in password 
generator, generates possibly predictable and enumerable passwords. This only 
applies to the QtPass GUI. The generator used libc's random(), seeded with 
srand(msecs), where msecs is not the msecs since 1970 (not that that'd be 
secure anyway), but rather the msecs since the last second. This means there 
are only 1000 different sequences of generated passwords.
  
  The problem has been fixed upstream in version 1.2.1. (planned to be
  shipped with ubuntu 18.04)
  
- Impact 
- ====== 
- Passwords generated using QtPass can potentially be recovered by an attacker 
due to the use of a non-cryptographically secure random number generator with a 
predictable seed. It is recommend to change all passwords created by QtPass. 
+ Impact
+ ======
+ Passwords generated using QtPass can potentially be recovered by an attacker 
due to the use of a non-cryptographically secure random number generator with a 
predictable seed. It is recommend to change all passwords created by QtPass.
  
- References 
- ========== 
- http://www.openwall.com/lists/oss-security/2018/01/05/5 
https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html 
- https://github.com/IJHack/QtPass/issues/338 
https://github.com/IJHack/QtPass/commit/e7bd0651335e1bf4f01512d1555fe0b960ff1787
 https://security.archlinux.org/CVE-2017-18021
+ References
+ ==========
+ http://www.openwall.com/lists/oss-security/2018/01/05/5 
+ https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html
+ https://github.com/IJHack/QtPass/issues/338 
https://github.com/IJHack/QtPass/commit/e7bd0651335e1bf4f01512d1555fe0b960ff1787
+ https://security.archlinux.org/CVE-2017-18021

** Description changed:

  Description
  ===========
  It was discovered that QtPass before 1.2.1, when using the built-in password 
generator, generates possibly predictable and enumerable passwords. This only 
applies to the QtPass GUI. The generator used libc's random(), seeded with 
srand(msecs), where msecs is not the msecs since 1970 (not that that'd be 
secure anyway), but rather the msecs since the last second. This means there 
are only 1000 different sequences of generated passwords.
  
  The problem has been fixed upstream in version 1.2.1. (planned to be
  shipped with ubuntu 18.04)
  
  Impact
  ======
  Passwords generated using QtPass can potentially be recovered by an attacker 
due to the use of a non-cryptographically secure random number generator with a 
predictable seed. It is recommend to change all passwords created by QtPass.
  
  References
  ==========
- http://www.openwall.com/lists/oss-security/2018/01/05/5 
+ http://www.openwall.com/lists/oss-security/2018/01/05/5
  https://lists.zx2c4.com/pipermail/password-store/2018-January/003165.html
- https://github.com/IJHack/QtPass/issues/338 
https://github.com/IJHack/QtPass/commit/e7bd0651335e1bf4f01512d1555fe0b960ff1787
+ https://github.com/IJHack/QtPass/issues/338 
+ 
https://github.com/IJHack/QtPass/commit/e7bd0651335e1bf4f01512d1555fe0b960ff1787
  https://security.archlinux.org/CVE-2017-18021

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747954

Title:
  qtpass generates possibly predictable and enumerable passwords

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qtpass/+bug/1747954/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to