CVE-2017-5999

Source
https://cve.org/CVERecord?id=CVE-2017-5999
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5999.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-5999
Published
2017-03-06T06:59:00.287Z
Modified
2025-11-14T05:14:58.248288Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in sysPass 2.x before 2.1, in which an algorithm was never sufficiently reviewed by cryptographers. The fact that inc/SP/Core/Crypt.class is using the MCRYPTRIJNDAEL256() function (the 256-bit block version of Rijndael, not AES) instead of MCRYPTRIJNDAEL128 (real AES) could help an attacker to create unknown havoc in the remote system.

References

Affected packages

Git / github.com/nuxsmin/syspass

Affected ranges

Type
GIT
Repo
https://github.com/nuxsmin/syspass
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7
1.0.8
1.0.9
1.1.2.13-rc.1
1.1.2.15-rc.1
1.1.2.16-rc.2
1.1.2.17
1.1.2.18
1.1.2.19
1.1.2.20
1.1.2.21
1.1.2.22
1.1.2.23
1.1.2.24
1.2.0.01-rc1
1.2.0.02-rc2
1.2.0.03-rc3
1.2.0.04-rc4
1.2.0.05-rc5
1.2.0.06
1.2.0.07
1.2.0.08
1.2.0.09
1.2.0.10
1.2.0.11
1.2.0.12
1.2.0.13
1.2.0.14
1.2.0.15
1.2.0.16
1.2.0.17
1.2.0.18
1.2.0.19
1.2.0.20
1.2.0.21

2.*

2.0.0.17011201-beta
2.0.0.17011202-beta
2.0.0.17011203-beta
2.0.0.17011204-beta
2.0.0.17011301-beta
2.0.0.17011302-beta
2.0.0.17011601-beta
2.0.0.17011602-beta
2.0.0.17011901-beta
2.0.0.17012301-beta
2.0.0.17012401-beta
2.0.0.17012402-beta
2.0.0.17012501-beta
2.0.0.17012601-beta
2.0.0.17012701-RC1
2.0.0.17013001-RC2
2.0.0.17020101-RC3
2.0.0.17020201-RC4
2.0.0.17021301
2.0.0.17021302
2.0.0.17021601
2.0.1.17010901-beta

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5999.json"