CVE-2010-3741
The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses single-iteration PBKDF2, which makes it easier for local users to decrypt a .ipd file via a brute-force attack.
- Published date
- 2010-10-05T18:00Z
- Last modification date
- 2017-09-19T01:31Z
- Assigner
- cve@mitre.org
- Problem type
- CWE-310
Name | URL | Source | Tags |
---|---|---|---|
http://blog.crackpassword.com/2010/09/smartphone-forensics-cracking-blackberry-backup-passwords/ | http://blog.crackpassword.com/2010/09/smartphone-forensics-cracking-blackberry-backup-passwords/ | MISC | |
http://www.infoworld.com/t/mobile-device-management/you-can-no-longer-rely-encryption-protect-blackberry-436 | http://www.infoworld.com/t/mobile-device-management/you-can-no-longer-rely-encryption-protect-blackberry-436 | MISC | |
http://twitter.com/elcomsoft/statuses/25954970586 | http://twitter.com/elcomsoft/statuses/25954970586 | MISC | |
http://it.slashdot.org/story/10/10/01/166226/ | http://it.slashdot.org/story/10/10/01/166226/ | MISC | |
oval:org.mitre.oval:def:7360 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7360 | OVAL |