2.1
CVSSv2

CVE-2004-2135

Published: 26/05/2004 Updated: 18/10/2016
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.4.0

linux linux kernel 2.4.14

linux linux kernel 2.4.15

linux linux kernel 2.4.18

linux linux kernel 2.4.19

linux linux kernel 2.4.21

linux linux kernel 2.4.25

linux linux kernel 2.4.26

linux linux kernel 2.4.29

linux linux kernel 2.4.4

linux linux kernel 2.4.5

linux linux kernel 2.5.10

linux linux kernel 2.5.11

linux linux kernel 2.5.19

linux linux kernel 2.5.2

linux linux kernel 2.5.26

linux linux kernel 2.5.27

linux linux kernel 2.5.33

linux linux kernel 2.5.34

linux linux kernel 2.5.41

linux linux kernel 2.5.42

linux linux kernel 2.5.49

linux linux kernel 2.4.10

linux linux kernel 2.4.11

linux linux kernel 2.4.2

linux linux kernel 2.4.20

linux linux kernel 2.4.23

linux linux kernel 2.4.23_ow2

linux linux kernel 2.4.27

linux linux kernel 2.4.30

linux linux kernel 2.4.8

linux linux kernel 2.4.9

linux linux kernel 2.5.14

linux linux kernel 2.5.15

linux linux kernel 2.5.16

linux linux kernel 2.5.22

linux linux kernel 2.5.23

linux linux kernel 2.5.3

linux linux kernel 2.5.30

linux linux kernel 2.5.37

linux linux kernel 2.5.38

linux linux kernel 2.5.39

linux linux kernel 2.5.45

linux linux kernel 2.5.46

linux linux kernel 2.5.52

linux linux kernel 2.5.53

linux linux kernel 2.5.60

linux linux kernel 2.5.61

linux linux kernel 2.5.68

linux linux kernel 2.5.69

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.8

linux linux kernel 2.6.4

linux linux kernel 2.6.5

linux linux kernel 2.6.8

linux linux kernel 2.6.9

linux linux kernel 2.4.1

linux linux kernel 2.4.16

linux linux kernel 2.4.17

linux linux kernel 2.4.22

linux linux kernel 2.4.3

linux linux kernel 2.4.6

linux linux kernel 2.4.7

linux linux kernel 2.5.12

linux linux kernel 2.5.13

linux linux kernel 2.5.20

linux linux kernel 2.5.21

linux linux kernel 2.5.28

linux linux kernel 2.5.29

linux linux kernel 2.5.35

linux linux kernel 2.5.36

linux linux kernel 2.5.43

linux linux kernel 2.5.44

linux linux kernel 2.5.50

linux linux kernel 2.5.51

linux linux kernel 2.5.58

linux linux kernel 2.5.59

linux linux kernel 2.5.6

linux linux kernel 2.5.66

linux linux kernel 2.5.67

linux linux kernel 2.6.11.5

linux linux kernel 2.6.11.6

linux linux kernel 2.6.2

linux linux kernel 2.6.3

linux linux kernel 2.5.5

linux linux kernel 2.5.56

linux linux kernel 2.5.57

linux linux kernel 2.5.64

linux linux kernel 2.5.65

linux linux kernel 2.5.9

linux linux kernel 2.6.10

linux linux kernel 2.6.11

linux linux kernel 2.6.12

linux linux kernel 2.6.7

linux linux kernel 2.4.12

linux linux kernel 2.4.13

linux linux kernel 2.4.24

linux linux kernel 2.4.24_ow1

linux linux kernel 2.4.28

linux linux kernel 2.4.31

linux linux kernel 2.5.0

linux linux kernel 2.5.1

linux linux kernel 2.5.17

linux linux kernel 2.5.18

linux linux kernel 2.5.24

linux linux kernel 2.5.25

linux linux kernel 2.5.31

linux linux kernel 2.5.32

linux linux kernel 2.5.4

linux linux kernel 2.5.40

linux linux kernel 2.5.47

linux linux kernel 2.5.48

linux linux kernel 2.5.54

linux linux kernel 2.5.55

linux linux kernel 2.5.62

linux linux kernel 2.5.63

linux linux kernel 2.5.7

linux linux kernel 2.5.8

linux linux kernel 2.6.6

linux linux kernel 2.6_test9_cvs

Exploits

source: wwwsecurityfocuscom/bid/13775/info Both cryptoloop and dm-crypt are reported prone to an information disclosure vulnerability Reports indicate that certain watermarked files may be detected on a filesystem that is encrypted using the affected loop device encryption schemes It should be noted that a successful attack would revea ...