FreeBSD : tarsnap -- cryptographic nonce reuse (2c2d4e83-2370-11e0-a91b-00e0815b8da8)

High Nessus Plugin ID 51567


The remote FreeBSD host is missing a security-related update.


Colin Percival reports :

In versions 1.0.22 through 1.0.27 of Tarsnap, the CTR nonce value is not incremented after each chunk is encrypted. (The CTR counter is correctly incremented after each 16 bytes of data was processed, but this counter is reset to zero for each new chunk.)

Note that since the Tarsnap client-server protocol is encrypted, being able to intercept Tarsnap client-server traffic does not provide an attacker with access to the data.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 51567

File Name: freebsd_pkg_2c2d4e83237011e0a91b00e0815b8da8.nasl

Version: $Revision: 1.5 $

Type: local

Published: 2011/01/19

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tarsnap, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2011/01/19

Vulnerability Publication Date: 2011/01/18