KeePass releases fix for password-leaking security bug By Mobile Malls June 6, 2023 0 287 views Over the weekend, the password administration instrument KeePass was up to date to handle a high-severity vulnerability which allowed risk actors to exfiltrate the grasp password in cleartext. Customers with KeePass variations 2.x are suggested to deliver their cases to model 2.54 to get rid of the risk. These utilizing KeePass 1.x, Strongbox, or KeePass XC, are usually not susceptible to the flaw and thus don’t have to migrate to the brand new model, in the event that they don’t wish to.Those who can not apply the patch for no matter purpose ought to reset their grasp password, delete crash dumps and hibernation information, and swap information that would maintain items of their grasp password. In additional excessive circumstances, they may reinstall their working system.Leftover stringsIn mid-Might, it was introduced that the password administration instrument was susceptible to CVE-2023-32784, a flaw that allowed risk actors to partially extract the KeePass grasp password from the appliance’s reminiscence dump. The grasp password would are available cleartext. The vulnerability was found by a risk researcher going by the alias “vdohney”, who additionally launched a proof-of-concept for the flaw. As defined by the researcher, the issue was present in SecureTextBoxEx: “Due to the way in which it processes enter, when the person sorts the password, there can be leftover strings,” they mentioned. “For instance, when “Password” is typed, it’s going to end in these leftover strings: •a, ••s, •••s, ••••w, •••••o, ••••••r, •••••••d.”Consequently, an attacker would be capable to get better virtually all grasp password characters, even when the workspace is locked, or this system was not too long ago shut down. In principle, a risk actor might deploy an infostealer or an identical malware variant to dump this system’s reminiscence and ship it, along with the password supervisor’s database, again to a server underneath the attacker’s management.From there, they’d be capable to exfiltrate the grasp password with out being pressed for time. With password managers, a grasp password is used to decrypt and entry the database holding all different passwords.See if KeePass is considered one of our contenders for the most effective password supervisorThrough: BleepingComputerShare this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)MoreClick to print (Opens in new window)Click to email a link to a friend (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Tumblr (Opens in new window)Click to share on Pinterest (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)