FreeBSD : tarsnap -- cryptographic nonce reuse (2c2d4e83-2370-11e0-a91b-00e0815b8da8)

high Nessus Plugin ID 51567

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Colin Percival reports :

In versions 1.0.22 through 1.0.27 of Tarsnap, the CTR nonce value is not incremented after each chunk is encrypted. (The CTR counter is correctly incremented after each 16 bytes of data was processed, but this counter is reset to zero for each new chunk.)

Note that since the Tarsnap client-server protocol is encrypted, being able to intercept Tarsnap client-server traffic does not provide an attacker with access to the data.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?63ccf431

http://www.nessus.org/u?c0e32df7

Plugin Details

Severity: High

ID: 51567

File Name: freebsd_pkg_2c2d4e83237011e0a91b00e0815b8da8.nasl

Version: 1.8

Type: local

Published: 1/19/2011

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tarsnap, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/19/2011

Vulnerability Publication Date: 1/18/2011