Skip to content

CVE-2023-32784 : is KeepassXC affected ? #9433

Answered by droidmonkey
ospring asked this question in Q&A
Discussion options

You must be logged in to vote

Based on this attack requirement, we are not vulnerable:

KeePass 2.X uses a custom-developed text box for password entry, SecureTextBoxEx. This text box is not only used for the master password entry, but in other places in KeePass as well, like password edit boxes (so the attack can also be used to recover their contents).

The flaw exploited here is that for every character typed, a leftover string is created in memory. Because of how .NET works, it is nearly impossible to get rid of it once it gets created. For example, when "Password" is typed, it will result in these leftover strings: •a, ••s, •••s, ••••w, •••••o, ••••••r, •••••••d. The POC application searches the dump for these pat…

Replies: 1 comment 2 replies

Comment options

You must be logged in to vote
2 replies
@ospring
Comment options

@phoerious
Comment options

Answer selected by droidmonkey
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants